SlideShare a Scribd company logo
Cyber Crimes
By: Sweta Dargad
Assistant Professor
Neotech Technical Campus
Definition
• Cybercrime is a term for any illegal
activity that uses a computer as its
primary means of commission.
• cyber crime also includes traditional crimes
conducted through the Internet.
• For example; hate crimes, telemarketing and
Internet fraud, identity theft, and credit card
account thefts are considered to be cyber crimes
when the illegal activities are committed through
the use of a computer and the Internet.
Classification
• Computer used to commit crime
• Computer as target of a crime
Computer used to commit crime
Child porn
Threatening email
Identity Theft
Spam
Phishing
Defamation
Threatening email
(Scamming)
• The threats can be terrifying in their intensity
and must be successful or the scammers
wouldn't keep doing it to extort money from
their victims.
• Assassination threats, "I've been hired to
kill you."
Identity Theft
• Identity theft is a crime whereby criminals
impersonate individuals, usually for financial gain.
• In today's society, you often need to reveal personal
bits of information about yourself, such as your
adhar-card number, signature, name, address,
phone number, cell number or even banking and
credit card information.
• If a thief is able to access this personal information,
he or she can use it to commit fraud in your name.
Spam
• Spam is most often considered to be electronic junk
mail or junk newsgroup postings.
• Some people define spam even more generally as
any unsolicited email.
• However, if a long-lost brother finds your email
address and sends you a message, this could hardly
be called spam, even though it is unsolicited.
• Real spam is generally email advertising for some
product sent to a mailing list or newsgroup.
• In addition to wasting people's time with unwanted
e-mail, spam also eats up a lot of network
bandwidth
Phishing
• Phishing is an e-mail fraud method in which the
perpetrator sends out legitimate-looking email
in an attempt to gather personal and financial
information from recipients.
• The messages appear to come from well known
and trustworthy Web sites.
• A phishing expedition, like the fishing
expedition it's named for, is a speculative
venture: the phisher puts the lure hoping to fool
at least a few of the prey that encounter the bait.
Cyber Defamation
• Cyber defamation is not a specific criminal
offense, misdemeanor or tort, but rather
defamation or slander conducted via digital
media, usually through the Internet.
• Defamation is the action of damaging the good
reputation of someone.
Computer as target of a crime
Viruses
Worms
Industrial Espionage
Software Piracy
Hacking
Computer Viruses
• A computer virus is a program or piece of code
that is loaded onto your computer without your
knowledge and runs against your wishes.
• Viruses can also replicate themselves.
• It will quickly use all available memory and
bring the system to a halt.
Computer Worms
• A computer worm is a self-replicating
computer program that penetrates an
operating system with the intent of spreading
malicious code.
• Worms utilize networks to send copies of the
original code to other computers, causing
harm by consuming bandwidth or possibly
deleting files or sending documents via email.
Industrial Espionage
• The purpose of espionage is to gather knowledge
about an organization.
• intellectual property, such as information on
industrial manufacture, ideas, techniques and
processes, recipes and formulas.
• theft of trade secrets, bribery, blackmail and
technological surveillance.
Software Piracy
• Software piracy is the illegal copying, distribution,
or use of software. It is such a profitable "business"
that it has caught the attention of organized crime
groups in a number of countries.
• Soft-lifting: Borrowing and installing a copy of a
software application from a colleague.
• Client-server overuse: Installing more copies of
the software than you have licenses for.
• Hard-disk loading: Installing and selling
unauthorized copies of software on refurbished or
new computers.
• Counterfeiting: Duplicating and selling
copyrighted programs.
Hacking
• hacking is any technical effort to manipulate the
normal behavior of network connections and
connected systems
• Malicious attacks on computer networks are
officially known as cracking, while hacking truly
applies only to activities having good intentions.
References
• http://whatis.techtarget.com

More Related Content

What's hot

Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
Roshan Kumar Bhattarai
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
Fizaril Amzari Omar
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer Crime
Dhrumil Panchal
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
Theresa Ann Rollins-Fanning
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
Ankit Malviya
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
Hamza Cheema
 
Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitionsRozell Sneede
 
Cyber security
Cyber securityCyber security
Cyber security
TanmoyMaitra
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
Cyberspace
CyberspaceCyberspace
Cyberspace
Utchi
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
JayfErika
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
Anna Stirling
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basicsanandraje
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Zeeshan Masood S
 

What's hot (20)

Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer Crime
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitions
 
Cyber security
Cyber securityCyber security
Cyber security
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 

Similar to Classifying Cybercrimes

Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
AmeyBarbade1
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb21
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
RavinderSingh172970
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptx
MarlynLiagao
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
Dr. B T Sampath Kumar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Avani Patel
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
Online
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ratnesh Sharma
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
TseAnRS
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Benjamin Sangalang
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 

Similar to Classifying Cybercrimes (20)

Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

More from sweta dargad

Sock Puppet.pptx
Sock Puppet.pptxSock Puppet.pptx
Sock Puppet.pptx
sweta dargad
 
Stacks
StacksStacks
Stacks
sweta dargad
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
sweta dargad
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
sweta dargad
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
sweta dargad
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
sweta dargad
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
sweta dargad
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
All about snmp
All about snmpAll about snmp
All about snmp
sweta dargad
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’ssweta dargad
 
Cacti
CactiCacti

More from sweta dargad (11)

Sock Puppet.pptx
Sock Puppet.pptxSock Puppet.pptx
Sock Puppet.pptx
 
Stacks
StacksStacks
Stacks
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
All about snmp
All about snmpAll about snmp
All about snmp
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’s
 
Cacti
CactiCacti
Cacti
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 

Classifying Cybercrimes

  • 1. Cyber Crimes By: Sweta Dargad Assistant Professor Neotech Technical Campus
  • 2. Definition • Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. • cyber crime also includes traditional crimes conducted through the Internet. • For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.
  • 3. Classification • Computer used to commit crime • Computer as target of a crime
  • 4. Computer used to commit crime Child porn Threatening email Identity Theft Spam Phishing Defamation
  • 5. Threatening email (Scamming) • The threats can be terrifying in their intensity and must be successful or the scammers wouldn't keep doing it to extort money from their victims. • Assassination threats, "I've been hired to kill you."
  • 6. Identity Theft • Identity theft is a crime whereby criminals impersonate individuals, usually for financial gain. • In today's society, you often need to reveal personal bits of information about yourself, such as your adhar-card number, signature, name, address, phone number, cell number or even banking and credit card information. • If a thief is able to access this personal information, he or she can use it to commit fraud in your name.
  • 7. Spam • Spam is most often considered to be electronic junk mail or junk newsgroup postings. • Some people define spam even more generally as any unsolicited email. • However, if a long-lost brother finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited. • Real spam is generally email advertising for some product sent to a mailing list or newsgroup. • In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth
  • 8. Phishing • Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. • The messages appear to come from well known and trustworthy Web sites. • A phishing expedition, like the fishing expedition it's named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait.
  • 9. Cyber Defamation • Cyber defamation is not a specific criminal offense, misdemeanor or tort, but rather defamation or slander conducted via digital media, usually through the Internet. • Defamation is the action of damaging the good reputation of someone.
  • 10. Computer as target of a crime Viruses Worms Industrial Espionage Software Piracy Hacking
  • 11. Computer Viruses • A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. • Viruses can also replicate themselves. • It will quickly use all available memory and bring the system to a halt.
  • 12. Computer Worms • A computer worm is a self-replicating computer program that penetrates an operating system with the intent of spreading malicious code. • Worms utilize networks to send copies of the original code to other computers, causing harm by consuming bandwidth or possibly deleting files or sending documents via email.
  • 13. Industrial Espionage • The purpose of espionage is to gather knowledge about an organization. • intellectual property, such as information on industrial manufacture, ideas, techniques and processes, recipes and formulas. • theft of trade secrets, bribery, blackmail and technological surveillance.
  • 14. Software Piracy • Software piracy is the illegal copying, distribution, or use of software. It is such a profitable "business" that it has caught the attention of organized crime groups in a number of countries. • Soft-lifting: Borrowing and installing a copy of a software application from a colleague. • Client-server overuse: Installing more copies of the software than you have licenses for. • Hard-disk loading: Installing and selling unauthorized copies of software on refurbished or new computers. • Counterfeiting: Duplicating and selling copyrighted programs.
  • 15. Hacking • hacking is any technical effort to manipulate the normal behavior of network connections and connected systems • Malicious attacks on computer networks are officially known as cracking, while hacking truly applies only to activities having good intentions.