SlideShare a Scribd company logo
WHO ARE CYBER
CRIMINAL |
CLASSIFICATION OF
CYBER CRIMES
Facilitator: Navjyotsinh Jadeja
Outline
• Who are Cyber Criminals
• Classification of Cybercrimes
• 3 Categories of Cybercrimes
WWW.EDTECHNOLOGY.IN
Who are Cyber Criminals?
• Cybercriminals are individuals or teams of people who use
technology to commit malicious activities on digital systems or
networks with the intention of stealing sensitive company
information or personal data, and generating profit.
• They are known to access the cybercriminal underground
markets found in the deep web to trade malicious goods and
services, such as hacking tools and stolen data.
WWW.EDTECHNOLOGY.IN
Classification of Cybercrimes
• Based on the subject of the crime, cybercrimes are classified
into three broad groups:
• Crimes against individuals
• Crimes against organizations
• Crimes against society
WWW.EDTECHNOLOGY.IN
Crimes against individuals
These crimes are committed against individuals or their
properties. Some examples are as follows:
• Email harassment or Cyber-stalking
• Spreading obscene material
• Unauthorized access or control over the computer system
• Spoofing via email
• Financial Frauds
• Derailing or affecting regular work activities.
WWW.EDTECHNOLOGY.IN
Crimes against organizations
Some examples of cyber crimes against organizations as
following:
• Possessing unauthorized information
• Cyber terrorism against a government organization
• Distributing pirated software
WWW.EDTECHNOLOGY.IN
Crimes against society
Some examples of crimes against society are as follows:
• Polluting the youth through indecent exposure
• Trafficking
• Financial crimes
• Online Gambling
• Forgery
WWW.EDTECHNOLOGY.IN
THANK YOU
WWW.EDTECHNOLOGY.IN

More Related Content

What's hot

document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
Kirti Temani
 
Lim JUS 394 Cyberterrorism
Lim JUS 394 CyberterrorismLim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
merlyna
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 
Viruses, Biometrics, Encryption
Viruses,  Biometrics,  EncryptionViruses,  Biometrics,  Encryption
Viruses, Biometrics, Encryption
Brain Young
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
ITNet
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 

What's hot (20)

Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Hacking
Hacking Hacking
Hacking
 
Lim JUS 394 Cyberterrorism
Lim JUS 394 CyberterrorismLim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Viruses, Biometrics, Encryption
Viruses,  Biometrics,  EncryptionViruses,  Biometrics,  Encryption
Viruses, Biometrics, Encryption
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Computer crime
Computer crimeComputer crime
Computer crime
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Data breach
Data breachData breach
Data breach
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Cyber crime final
Cyber crime finalCyber crime final
Cyber crime final
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 

Similar to 1.2 Who are Cyber Criminals

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
SVS College
 

Similar to 1.2 Who are Cyber Criminals (20)

Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cybercrimes and Cybercriminals
Cybercrimes and CybercriminalsCybercrimes and Cybercriminals
Cybercrimes and Cybercriminals
 
Hacking
HackingHacking
Hacking
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 

More from Navjyotsinh Jadeja

More from Navjyotsinh Jadeja (8)

what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 
Software myths | Software Engineering Notes
Software myths | Software Engineering NotesSoftware myths | Software Engineering Notes
Software myths | Software Engineering Notes
 
Market basket analysis | Association Rules Mining | R Programming
Market basket analysis | Association Rules Mining | R ProgrammingMarket basket analysis | Association Rules Mining | R Programming
Market basket analysis | Association Rules Mining | R Programming
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
 
CHATBOT using Facebook Messenger
CHATBOT using Facebook MessengerCHATBOT using Facebook Messenger
CHATBOT using Facebook Messenger
 
Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)
 
COCOMO model | How to calculate effort, staffing and Duration of Project
COCOMO model | How to calculate effort, staffing and Duration of ProjectCOCOMO model | How to calculate effort, staffing and Duration of Project
COCOMO model | How to calculate effort, staffing and Duration of Project
 
How to make Gantt chart in Excel
How to make Gantt chart in ExcelHow to make Gantt chart in Excel
How to make Gantt chart in Excel
 

Recently uploaded

Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 

Recently uploaded (18)

Chambers Global Practice Guide - Corporate M&A 2024 - Canadian M&A
Chambers Global Practice Guide - Corporate M&A 2024 - Canadian M&AChambers Global Practice Guide - Corporate M&A 2024 - Canadian M&A
Chambers Global Practice Guide - Corporate M&A 2024 - Canadian M&A
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
indian evidence act.pdf.......very helpful for law student
indian evidence act.pdf.......very helpful for law studentindian evidence act.pdf.......very helpful for law student
indian evidence act.pdf.......very helpful for law student
 
Book review - Amartya Sen's Idea of Justice
Book review - Amartya Sen's Idea of JusticeBook review - Amartya Sen's Idea of Justice
Book review - Amartya Sen's Idea of Justice
 
Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
 
Justice Advocates Legal Defence Firm
Justice Advocates Legal Defence FirmJustice Advocates Legal Defence Firm
Justice Advocates Legal Defence Firm
 
Charge and its essentials rules Under the CRPC, 1898
Charge and its essentials rules Under the CRPC, 1898Charge and its essentials rules Under the CRPC, 1898
Charge and its essentials rules Under the CRPC, 1898
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdf7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdf
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Application of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of lawsApplication of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of laws
 
Solidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South AfricaSolidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South Africa
 

1.2 Who are Cyber Criminals

  • 1. WHO ARE CYBER CRIMINAL | CLASSIFICATION OF CYBER CRIMES Facilitator: Navjyotsinh Jadeja
  • 2. Outline • Who are Cyber Criminals • Classification of Cybercrimes • 3 Categories of Cybercrimes WWW.EDTECHNOLOGY.IN
  • 3. Who are Cyber Criminals? • Cybercriminals are individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit. • They are known to access the cybercriminal underground markets found in the deep web to trade malicious goods and services, such as hacking tools and stolen data. WWW.EDTECHNOLOGY.IN
  • 4. Classification of Cybercrimes • Based on the subject of the crime, cybercrimes are classified into three broad groups: • Crimes against individuals • Crimes against organizations • Crimes against society WWW.EDTECHNOLOGY.IN
  • 5. Crimes against individuals These crimes are committed against individuals or their properties. Some examples are as follows: • Email harassment or Cyber-stalking • Spreading obscene material • Unauthorized access or control over the computer system • Spoofing via email • Financial Frauds • Derailing or affecting regular work activities. WWW.EDTECHNOLOGY.IN
  • 6. Crimes against organizations Some examples of cyber crimes against organizations as following: • Possessing unauthorized information • Cyber terrorism against a government organization • Distributing pirated software WWW.EDTECHNOLOGY.IN
  • 7. Crimes against society Some examples of crimes against society are as follows: • Polluting the youth through indecent exposure • Trafficking • Financial crimes • Online Gambling • Forgery WWW.EDTECHNOLOGY.IN