SlideShare a Scribd company logo
1 of 16
BUSINESS LAW ASSIGNMENT:2
ROLL NO: 18UR20
TOPIC :TYPES OF CYBER CRIMES
MEANING AND DEFINITION
CYBERCRIME IS DEFINED AS A CRIME IN WHICH A COMPUTER
IS THE OBJECT OF THE CEIME( HACKING,PHISHING,SPAMMING) OR IS
USED AS ATOOL TO COMMIT AN OFFENSE (CHILD PORNOGRAPHY,
HATE CRIMES )…CRIMINALS CAN ALSO USE COMPUTERS FOR
COMMUNICATION AND DOCUMENT POR DATA STORAGE.
MOST COMMON TYPES OF CYBERCRIMES ACTS
CYBERCRIME INVOLVES THE USE OF COMPUTER AND
NETWORK IN HACKING COMPUTERS AND NETWORK AS
WELL. CYBERCRIMINAKS DEVISE VARIOUS STRATEGIES AND
PROGRAMS TO ATTACK COMPUTERS AND SYSTEM. THE
FOLLOWING ARE THE MOST COMMON TYPES OF
CYBERCRIMES
1. FRAUD
FRAUD IS A GENERAL TREM USED TO DESCRIBE A
CYBERCRIME THAT INTENDS TO DECEIVE A PERSON IN
ORDER TO GAIN IMPORTANT DATA OR INFORMATION.
FRAUD CAN BE DONE BY ALTERING ,DESTROYING
,STEALING , OR SUPPRESSING ANY INFORMATION TO
SECURE UNLAWFUL OR UNFAIR GAIN
2.BOTNETS
BOTNETS ARE CONTROLLED BY REMOTE
ATTACKERS CALLED “BOT HERDERS” IN ORDER TO
ATTACK COMPUTERS BY SENDING SPAMS OR
MALWARE. THEY USUALLY ATTACK BUSINESSES AND
GOVERNMENTS AS BOTNETS SPECIFICALLY ATTACK
THE INFORMATION TECHNOLOGY INFRASTRUCTURE.
THERE ARE BOTNET REMOVAL TOOLS AVAILABLE ON
THE WEB TO DETECT AND BLOCK BOTNETS FROM
ENTERING YOUR SYSTEM.
3.HACKING
HACKING INVOLVES THE PARTIAL OR COMPLETE
ACQUISITION OF CERTAIN FUNCTIONS WITHIN A
SYSTEM, NETWORK, OR WEBSITE. IT ALSO AIMS TO
ACCESS TO IMPORTANT DATA AND INFORMATION,
BREACHING PRIVACY. MOST “HACKERS” ATTACK
CORPORATE AND GOVERNMENT ACCOUNTS. THERE
ARE DIFFERENT TYPES OF HACKING METHODS AND
PROCEDURES.
4.SCAMMING
SCAM HAPPENS IN A VARIETY OF FORMS. IN
CYBERSPACE, SCAMMING CAN BE DONE BY OFFERING
COMPUTER REPAIR, NETWORK TROUBLESHOOTING,
AND IT SUPPORT SERVICES, FORCING USERS TO SHELL
OUT HUNDREDS OF MONEY FOR CYBER PROBLEMS
THAT DO NOT EVEN EXIST. ANY ILLEGAL PLANS TO
MAKE MONEY FALLS TO SCAMMING.
5.MALVERTISING.
MALVERTISING IS THE METHOD OF FILLING
WEBSITES WITH ADV.ERTISEMENTS CARRYING
MALICIOUS CODES. USERS WILL CLICK THESE
ADVERTISEMENTS, THINKING THEY ARE LEGITIMATE.
ONCE THEY CLICK THESE ADS, THEY WILL BE
REDIRECTED TO FAKE WEBSITES OR A FILE CARRYING
VIRUSES AND MALWARE WILL AUTOMATICALLY BE
DOWNLOADED
6.SOFTWARE PIRACY
THE INTERNET IS FILLED WITH TORRENTS AND
OTHER PROGRAMS THAT ILLEGALLY DUPLICATE
ORIGINAL CONTENT, INCLUDING SONGS, BOOKS,
MOVIES, ALBUMS, AND SOFTWARE. THIS IS A CRIME
AS IT TRANSLATES TO COPYRIGHT INFRINGEMENT.
DUE TO SOFTWARE PIRACY, COMPANIES AND
DEVELOPERS ENCOUNTER HUGE CUT DOWN IN THEIR
INCOME BECAUSE THEIR PRODUCTS ARE ILLEGALLY
REPRODUCED.
7.SOCIAL ENGINEERING
SOCIAL ENGINEERING IS A METHOD IN WHICH
CYBERCRIMINALS MAKE A DIRECT CONTACT WITH
YOU THROUGH PHONE CALLS, EMAILS, OR EVEN IN
PERSON. BASICALLY, THEY WILL ALSO ACT LIKE A
LEGITIMATE COMPANY AS WELL. THEY WILL
BEFRIEND YOU TO EARN YOUR TRUST UNTIL YOU
WILL PROVIDE YOUR IMPORTANT INFORMATION AND
PERSONAL DATA
8.PHISHING
PHISHERS ACT LIKE A LEGITIMATE COMPANY
OR ORGANIZATION. THEY USE “EMAIL SPOOFING”
TO EXTRACT CONFIDENTIAL INFORMATION SUCH
AS CREDIT CARD NUMBERS, SOCIAL SECURITY
NUMBER, PASSWORDS, ETC. THEY SEND OUT
THOUSANDS OF PHISHING EMAILS CARRYING
LINKS TO FAKE WEBSITES. USERS WILL BELIEVE
THESE ARE LEGITIMATE, THUS ENTERING THEIR
PERSONAL INFORMATION
9.SPAMMING
SPAMMING USES ELECTRONIC MESSAGING
SYSTEMS, MOST COMMONLY EMAILS IN SENDING
MESSAGES THAT HOST MALWARE, FAKE LINKS OF
WEBSITES, AND OTHER MALICIOUS PROGRAMS.
EMAIL SPAMMING IS VERY POPULAR. UNSOLICITED
BULK MESSAGES FROM UNFAMILIAR
ORGANIZATIONS, COMPANIES, AND GROUPS ARE SENT
TO LARGE NUMBERS OF USERS. IT OFFERS DEALS,
PROMOS, AND OTHER ATTRACTIVE COMPONENTS TO
DECEIVE USERS.
9.DDOS ATTACK
DDOS OR THE DISTRIBUTED DENIAL OF SERVICE
ATTACK IS ONE OF THE MOST POPULAR METHODS OF
HACKING. IT TEMPORARILY OR COMPLETELY
INTERRUPTS SERVERS AND NETWORKS THAT ARE
SUCCESSFULLY RUNNING. WHEN THE SYSTEM IS
OFFLINE, THEY COMPROMISE CERTAIN FUNCTIONS TO
MAKE THE WEBSITE UNAVAILABLE FOR USERS. THE
MAIN GOAL IS FOR USERS TO PAY ATTENTION TO THE
DDOS ATTACK, GIVING HACKERS THE CHANCE TO
HACK THE SYSTEM
10.CHILD PORNOGRAPHY
PORN CONTENT IS VERY ACCESSIBLE NOW
BECAUSE OF THE INTERNET. MOST COUNTRIES HAVE
LAWS THAT PENALIZE CHILD PORNOGRAPHY.
BASICALLY, THIS CYBERCRIME INVOLVES THE
EXPLOITATION OF CHILDREN IN THE PORN INDUSTRY.
CHILD PORNOGRAPHY IS A $3-BILLION-A-YEAR
INDUSTRY. UNFORTUNATELY, OVER 10,000 INTERNET
LOCATIONS PROVIDE ACCESS TO CHILD PORN
11.CYBERBULLYING
CYBERBULLYING IS ONE OF THE MOST
RAMPANT CRIMES COMMITTED IN THE VIRTUAL
WORLD. IT IS A FORM OF BULLYING CARRIED OVER
TO THE INTERNET. ON THE OTHER HAND, GLOBAL
LEADERS ARE AWARE OF THIS CRIME AND PASS LAWS
AND ACTS THAT PROHIBIT THE PROLIFERATION OF
CYBERBULLYING
THANK YOU

More Related Content

What's hot

Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Jisc
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising Mohd Arif
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 
It presentation cyber crime
It presentation cyber crimeIt presentation cyber crime
It presentation cyber crimeAshish Ojha
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 
Dons Cyber Law Ppt
Dons Cyber Law PptDons Cyber Law Ppt
Dons Cyber Law Pptnarveen94
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Equifax data breach
Equifax data breachEquifax data breach
Equifax data breachSajib Sen
 

What's hot (20)

Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
It presentation cyber crime
It presentation cyber crimeIt presentation cyber crime
It presentation cyber crime
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Dons Cyber Law Ppt
Dons Cyber Law PptDons Cyber Law Ppt
Dons Cyber Law Ppt
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Equifax data breach
Equifax data breachEquifax data breach
Equifax data breach
 

Similar to Business law assignment

Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimePsychoticBanda
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against propertyvarunbamba
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 

Similar to Business law assignment (20)

Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 

Recently uploaded

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 

Recently uploaded (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 

Business law assignment

  • 1. BUSINESS LAW ASSIGNMENT:2 ROLL NO: 18UR20 TOPIC :TYPES OF CYBER CRIMES
  • 2. MEANING AND DEFINITION CYBERCRIME IS DEFINED AS A CRIME IN WHICH A COMPUTER IS THE OBJECT OF THE CEIME( HACKING,PHISHING,SPAMMING) OR IS USED AS ATOOL TO COMMIT AN OFFENSE (CHILD PORNOGRAPHY, HATE CRIMES )…CRIMINALS CAN ALSO USE COMPUTERS FOR COMMUNICATION AND DOCUMENT POR DATA STORAGE.
  • 3. MOST COMMON TYPES OF CYBERCRIMES ACTS CYBERCRIME INVOLVES THE USE OF COMPUTER AND NETWORK IN HACKING COMPUTERS AND NETWORK AS WELL. CYBERCRIMINAKS DEVISE VARIOUS STRATEGIES AND PROGRAMS TO ATTACK COMPUTERS AND SYSTEM. THE FOLLOWING ARE THE MOST COMMON TYPES OF CYBERCRIMES
  • 4. 1. FRAUD FRAUD IS A GENERAL TREM USED TO DESCRIBE A CYBERCRIME THAT INTENDS TO DECEIVE A PERSON IN ORDER TO GAIN IMPORTANT DATA OR INFORMATION. FRAUD CAN BE DONE BY ALTERING ,DESTROYING ,STEALING , OR SUPPRESSING ANY INFORMATION TO SECURE UNLAWFUL OR UNFAIR GAIN
  • 5. 2.BOTNETS BOTNETS ARE CONTROLLED BY REMOTE ATTACKERS CALLED “BOT HERDERS” IN ORDER TO ATTACK COMPUTERS BY SENDING SPAMS OR MALWARE. THEY USUALLY ATTACK BUSINESSES AND GOVERNMENTS AS BOTNETS SPECIFICALLY ATTACK THE INFORMATION TECHNOLOGY INFRASTRUCTURE. THERE ARE BOTNET REMOVAL TOOLS AVAILABLE ON THE WEB TO DETECT AND BLOCK BOTNETS FROM ENTERING YOUR SYSTEM.
  • 6. 3.HACKING HACKING INVOLVES THE PARTIAL OR COMPLETE ACQUISITION OF CERTAIN FUNCTIONS WITHIN A SYSTEM, NETWORK, OR WEBSITE. IT ALSO AIMS TO ACCESS TO IMPORTANT DATA AND INFORMATION, BREACHING PRIVACY. MOST “HACKERS” ATTACK CORPORATE AND GOVERNMENT ACCOUNTS. THERE ARE DIFFERENT TYPES OF HACKING METHODS AND PROCEDURES.
  • 7. 4.SCAMMING SCAM HAPPENS IN A VARIETY OF FORMS. IN CYBERSPACE, SCAMMING CAN BE DONE BY OFFERING COMPUTER REPAIR, NETWORK TROUBLESHOOTING, AND IT SUPPORT SERVICES, FORCING USERS TO SHELL OUT HUNDREDS OF MONEY FOR CYBER PROBLEMS THAT DO NOT EVEN EXIST. ANY ILLEGAL PLANS TO MAKE MONEY FALLS TO SCAMMING.
  • 8. 5.MALVERTISING. MALVERTISING IS THE METHOD OF FILLING WEBSITES WITH ADV.ERTISEMENTS CARRYING MALICIOUS CODES. USERS WILL CLICK THESE ADVERTISEMENTS, THINKING THEY ARE LEGITIMATE. ONCE THEY CLICK THESE ADS, THEY WILL BE REDIRECTED TO FAKE WEBSITES OR A FILE CARRYING VIRUSES AND MALWARE WILL AUTOMATICALLY BE DOWNLOADED
  • 9. 6.SOFTWARE PIRACY THE INTERNET IS FILLED WITH TORRENTS AND OTHER PROGRAMS THAT ILLEGALLY DUPLICATE ORIGINAL CONTENT, INCLUDING SONGS, BOOKS, MOVIES, ALBUMS, AND SOFTWARE. THIS IS A CRIME AS IT TRANSLATES TO COPYRIGHT INFRINGEMENT. DUE TO SOFTWARE PIRACY, COMPANIES AND DEVELOPERS ENCOUNTER HUGE CUT DOWN IN THEIR INCOME BECAUSE THEIR PRODUCTS ARE ILLEGALLY REPRODUCED.
  • 10. 7.SOCIAL ENGINEERING SOCIAL ENGINEERING IS A METHOD IN WHICH CYBERCRIMINALS MAKE A DIRECT CONTACT WITH YOU THROUGH PHONE CALLS, EMAILS, OR EVEN IN PERSON. BASICALLY, THEY WILL ALSO ACT LIKE A LEGITIMATE COMPANY AS WELL. THEY WILL BEFRIEND YOU TO EARN YOUR TRUST UNTIL YOU WILL PROVIDE YOUR IMPORTANT INFORMATION AND PERSONAL DATA
  • 11. 8.PHISHING PHISHERS ACT LIKE A LEGITIMATE COMPANY OR ORGANIZATION. THEY USE “EMAIL SPOOFING” TO EXTRACT CONFIDENTIAL INFORMATION SUCH AS CREDIT CARD NUMBERS, SOCIAL SECURITY NUMBER, PASSWORDS, ETC. THEY SEND OUT THOUSANDS OF PHISHING EMAILS CARRYING LINKS TO FAKE WEBSITES. USERS WILL BELIEVE THESE ARE LEGITIMATE, THUS ENTERING THEIR PERSONAL INFORMATION
  • 12. 9.SPAMMING SPAMMING USES ELECTRONIC MESSAGING SYSTEMS, MOST COMMONLY EMAILS IN SENDING MESSAGES THAT HOST MALWARE, FAKE LINKS OF WEBSITES, AND OTHER MALICIOUS PROGRAMS. EMAIL SPAMMING IS VERY POPULAR. UNSOLICITED BULK MESSAGES FROM UNFAMILIAR ORGANIZATIONS, COMPANIES, AND GROUPS ARE SENT TO LARGE NUMBERS OF USERS. IT OFFERS DEALS, PROMOS, AND OTHER ATTRACTIVE COMPONENTS TO DECEIVE USERS.
  • 13. 9.DDOS ATTACK DDOS OR THE DISTRIBUTED DENIAL OF SERVICE ATTACK IS ONE OF THE MOST POPULAR METHODS OF HACKING. IT TEMPORARILY OR COMPLETELY INTERRUPTS SERVERS AND NETWORKS THAT ARE SUCCESSFULLY RUNNING. WHEN THE SYSTEM IS OFFLINE, THEY COMPROMISE CERTAIN FUNCTIONS TO MAKE THE WEBSITE UNAVAILABLE FOR USERS. THE MAIN GOAL IS FOR USERS TO PAY ATTENTION TO THE DDOS ATTACK, GIVING HACKERS THE CHANCE TO HACK THE SYSTEM
  • 14. 10.CHILD PORNOGRAPHY PORN CONTENT IS VERY ACCESSIBLE NOW BECAUSE OF THE INTERNET. MOST COUNTRIES HAVE LAWS THAT PENALIZE CHILD PORNOGRAPHY. BASICALLY, THIS CYBERCRIME INVOLVES THE EXPLOITATION OF CHILDREN IN THE PORN INDUSTRY. CHILD PORNOGRAPHY IS A $3-BILLION-A-YEAR INDUSTRY. UNFORTUNATELY, OVER 10,000 INTERNET LOCATIONS PROVIDE ACCESS TO CHILD PORN
  • 15. 11.CYBERBULLYING CYBERBULLYING IS ONE OF THE MOST RAMPANT CRIMES COMMITTED IN THE VIRTUAL WORLD. IT IS A FORM OF BULLYING CARRIED OVER TO THE INTERNET. ON THE OTHER HAND, GLOBAL LEADERS ARE AWARE OF THIS CRIME AND PASS LAWS AND ACTS THAT PROHIBIT THE PROLIFERATION OF CYBERBULLYING