SlideShare a Scribd company logo
1 of 19
Introduction
• Computer crime, or cybercrime, is any crime that involves
a computer and a network.
• The computer may have been used in the commission of a
crime, or it may be the target.
• Defination : "Offences that are committed against individuals
or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental
harm, or loss, to the victim directly or indirectly, using
modern telecommunication networks such as Internet (Chat
rooms, emails, notice boards and groups) and mobile phones
(SMS/MMS)". Such crimes may threaten a nation’s security
and financial health.
• Issues surrounding these types of crimes have become
high-profile, particularly those
surrounding hacking, copyright infringement, child
pornography, and child grooming.
• There are also problems
of privacy when confidential information is intercepted
or disclosed, lawfully or otherwise.
• Cybercrime against women:- Crimes targeted against
women with a motive to intentionally harm the victim
psychologically and physically, using modern
telecommunication networks such as internet and
mobile phones.
• A report (sponsored by UN) estimates that the
annual damage to the global economy is at $445
billion
Introduction
Fraud and financial crimes
• Computer fraud is any dishonest misrepresentation of fact
intended to let another to do or refrain from doing something
which causes loss.
• This requires little technical expertise and is common form of theft
by employees altering the data before entry or entering false data,
or by entering unauthorized instructions or using unauthorized
processes;
• Altering, destroying, suppressing, or stealing output, usually to
conceal unauthorized transactions. This is difficult to detect
Altering or deleting stored data;
• Other forms of fraud may be facilitated using computer systems,
including bank fraud, carding, identity theft, extortion, and theft of
classified information.
Cyber extortion
Cyber extortion occurs when a website, e-mail server, or computer system is
subjected to or threatened with repeated denial of service or other attacks by
hackers.
These hackers demand money in return for promising to stop the attacks and to
offer "protection". According to the Federal Bureau of Investigation, cyber
extortionists are increasingly attacking corporate websites and networks, crippling
their ability to operate and demanding payments to restore their service.
More than 20 cases are reported each month and many go unreported in order to
keep the victim's name out of the public domain. Perpetrators typically use
a distributed denial-of-service attack.
The Sony Pictures Entertainment hack was a release of
confidential data belonging to Sony Pictures Entertainment on
November 24, 2014. The data included personal information about
Sony Pictures employees and their families, e-mails between
employees, information about executive salaries at the company,
copies of (previously) unreleased Sony films, and other information.
The hackers called themselves the "Guardians of Peace" or "GOP"
and demanded the cancellation of the planned release of the
film The Interview, a comedy about a plot to assassinate North
Korean leader Kim Jong-un.
An Example of cyber extortion was the attack on Sony
Pictures of 2014.
Cyber terrorism
• Cyberterrorism is the act of Internet terrorism in terrorist activities,
including acts of deliberate, large-scale disruption of computer
networks, especially of personal computers attached to the Internet,
by the means of tools such as computer viruses.
• A cyber terrorist is someone who intimidates or coerces a government
or organization to advance his or her political or social objectives by
launching a computer-based attack against computers, networks, or
the information stored on them.
• As such, a simple propaganda in the Internet, that there will be bomb
attacks during the holidays can be considered cyber terrorism.
• As well there are also hacking activities directed towards individuals,
families, organized by groups within networks, tending to cause fear
among people, demonstrate power, collecting information relevant for
ruining peoples' lives, robberies, blackmailing etc.
• Cyberterrorism in general, can be defined as an act of
terrorism committed through the use of cyberspace or
computer resources.
• But there is a growing concern IT officials that such intrusions
are part of an organized effort by cyber terrorists, foreign
intelligence services, or other groups to map potential
security holes in critical systems.
However, there is an old saying that death or loss of property are
the side products of terrorism, the main purpose of such incidents
is to create terror in peoples mind. If any incident in the cyber
world can create terror, it may be called a Cyber-terrorism.
Obscene or offensive content
• The content of websites and other electronic communications
may be distasteful, obscene or offensive for a variety of reasons.
In some instances these communications may be legal.
• The extent to which these communications are unlawful varies
greatly between countries, and even within nations. It is a
sensitive area in which the courts can become involved in
arbitrating between groups with strong beliefs.
• One area of Internet pornography that has been the target of
the strongest efforts at curtailment is child pornography.
• The Internet is being highly used by its abusers to reach and
abuse children sexually, worldwide.
Harassment
Whereas content may be offensive in a non-specific way, harassment directs
obscenities and derogatory comments at specific individuals focusing for
example on gender, race, religion, nationality, sexual orientation.
This often occurs in chat rooms, through newsgroups, and by sending hate e-
mail to interested parties.
Harassment targeting women and children in the internet also includes revenge
pornography. There are instances where committing a crime using a computer
can lead to an enhanced sentence.
Drug trafficking
• "Drug traffickers are increasingly taking advantage of the Internet"
according to cyber authorities and personnel.
• To sell their illegal substances through encrypted e-mail and other
Internet Technology.
• Some drug traffickers arrange deals at internet cafes, use courier
Web sites to track illegal packages of pills, and swap recipes for
amphetamines in restricted-access chat rooms.
• The rise in Internet drug trades could also be attributed to the lack
of face-to-face communication. These virtual exchanges allow more
intimidated individuals to more comfortably purchase illegal drugs.
The sketchy effects that are often associated with drug trades are
severely minimized and the filtering process that comes with
physical interaction fades away.
• Due to easily exploitable laws, cybercriminals use developing countries in
order to evade detection and prosecution from law enforcement.
• In developing countries, such as the Philippines, laws against cybercrime
are weak or sometimes nonexistent.
• These weak laws allow cybercriminals to strike from international borders
and remain undetected.
• Even when identified, these criminals avoid being punished or extradited to
a country, such as the United States, that has developed laws that allow for
prosecution.
Legislation
While this proves difficult in some cases, agencies, such as the FBI, have
used deception and subterfuge to catch criminals. For example, two
Russian hackers had been evading the FBI for some time. The FBI set up a
fake computing company based in Seattle, Washington. They proceeded to
lure the two Russian men into the United States by offering them work
with this company. Upon completion of the interview, the suspects were
arrested outside of the building. Clever tricks like this are sometimes a
necessary part of catching cybercriminals when weak legislation makes it
impossible otherwise.
Legislation
Case law
Cyber crime rate worldwide
Thanking you

More Related Content

What's hot

Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
Ahtasham Ali
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
kelsports
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
Siddharth Anand
 

What's hot (20)

Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Viewers also liked

Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
Asish Verma
 

Viewers also liked (20)

Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion Menace
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes ...
16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes ...16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes ...
16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes ...
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Crime against women
Crime against womenCrime against women
Crime against women
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
 
創業贏家系列 詹翔霖教授-運動服務業創新創業輔導計畫簡章-學生組
創業贏家系列 詹翔霖教授-運動服務業創新創業輔導計畫簡章-學生組創業贏家系列 詹翔霖教授-運動服務業創新創業輔導計畫簡章-學生組
創業贏家系列 詹翔霖教授-運動服務業創新創業輔導計畫簡章-學生組
 
CEC Presentation: Disability 101
CEC Presentation: Disability 101CEC Presentation: Disability 101
CEC Presentation: Disability 101
 
Qcl 15-v4 [challenge-no 2]_[imnu]_[shubham gupta]
Qcl 15-v4 [challenge-no 2]_[imnu]_[shubham gupta]Qcl 15-v4 [challenge-no 2]_[imnu]_[shubham gupta]
Qcl 15-v4 [challenge-no 2]_[imnu]_[shubham gupta]
 
حاشية القونوي على تفسير الإمام البيضاوي 16
حاشية القونوي على تفسير الإمام البيضاوي 16حاشية القونوي على تفسير الإمام البيضاوي 16
حاشية القونوي على تفسير الإمام البيضاوي 16
 

Similar to cyber crime

Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 

Similar to cyber crime (20)

cyber crime
 cyber crime  cyber crime
cyber crime
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Recently uploaded (20)

Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 

cyber crime

  • 1.
  • 2. Introduction • Computer crime, or cybercrime, is any crime that involves a computer and a network. • The computer may have been used in the commission of a crime, or it may be the target. • Defination : "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health.
  • 3. • Issues surrounding these types of crimes have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. • There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise. • Cybercrime against women:- Crimes targeted against women with a motive to intentionally harm the victim psychologically and physically, using modern telecommunication networks such as internet and mobile phones. • A report (sponsored by UN) estimates that the annual damage to the global economy is at $445 billion Introduction
  • 4. Fraud and financial crimes • Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. • This requires little technical expertise and is common form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes; • Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions. This is difficult to detect Altering or deleting stored data; • Other forms of fraud may be facilitated using computer systems, including bank fraud, carding, identity theft, extortion, and theft of classified information.
  • 5. Cyber extortion Cyber extortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated denial of service or other attacks by hackers. These hackers demand money in return for promising to stop the attacks and to offer "protection". According to the Federal Bureau of Investigation, cyber extortionists are increasingly attacking corporate websites and networks, crippling their ability to operate and demanding payments to restore their service. More than 20 cases are reported each month and many go unreported in order to keep the victim's name out of the public domain. Perpetrators typically use a distributed denial-of-service attack.
  • 6. The Sony Pictures Entertainment hack was a release of confidential data belonging to Sony Pictures Entertainment on November 24, 2014. The data included personal information about Sony Pictures employees and their families, e-mails between employees, information about executive salaries at the company, copies of (previously) unreleased Sony films, and other information. The hackers called themselves the "Guardians of Peace" or "GOP" and demanded the cancellation of the planned release of the film The Interview, a comedy about a plot to assassinate North Korean leader Kim Jong-un. An Example of cyber extortion was the attack on Sony Pictures of 2014.
  • 7. Cyber terrorism • Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. • A cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching a computer-based attack against computers, networks, or the information stored on them. • As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyber terrorism. • As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc.
  • 8. • Cyberterrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources. • But there is a growing concern IT officials that such intrusions are part of an organized effort by cyber terrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. However, there is an old saying that death or loss of property are the side products of terrorism, the main purpose of such incidents is to create terror in peoples mind. If any incident in the cyber world can create terror, it may be called a Cyber-terrorism.
  • 9. Obscene or offensive content • The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be legal. • The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs. • One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography. • The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide.
  • 10. Harassment Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e- mail to interested parties. Harassment targeting women and children in the internet also includes revenge pornography. There are instances where committing a crime using a computer can lead to an enhanced sentence.
  • 11. Drug trafficking • "Drug traffickers are increasingly taking advantage of the Internet" according to cyber authorities and personnel. • To sell their illegal substances through encrypted e-mail and other Internet Technology. • Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms. • The rise in Internet drug trades could also be attributed to the lack of face-to-face communication. These virtual exchanges allow more intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are often associated with drug trades are severely minimized and the filtering process that comes with physical interaction fades away.
  • 12. • Due to easily exploitable laws, cybercriminals use developing countries in order to evade detection and prosecution from law enforcement. • In developing countries, such as the Philippines, laws against cybercrime are weak or sometimes nonexistent. • These weak laws allow cybercriminals to strike from international borders and remain undetected. • Even when identified, these criminals avoid being punished or extradited to a country, such as the United States, that has developed laws that allow for prosecution. Legislation
  • 13. While this proves difficult in some cases, agencies, such as the FBI, have used deception and subterfuge to catch criminals. For example, two Russian hackers had been evading the FBI for some time. The FBI set up a fake computing company based in Seattle, Washington. They proceeded to lure the two Russian men into the United States by offering them work with this company. Upon completion of the interview, the suspects were arrested outside of the building. Clever tricks like this are sometimes a necessary part of catching cybercriminals when weak legislation makes it impossible otherwise. Legislation
  • 15.
  • 16.
  • 17.
  • 18. Cyber crime rate worldwide