SlideShare a Scribd company logo
1 of 18
Computer Crime is a term used to broadly describe criminal activity in
which computers or computer networks are a tool, a target, or a
place of criminal activity and include everything from electronic
cracking to denial of service attacks. It is also used to include
traditional crimes in which computers or networks are used to enable
the illicit activity.
Computer crime mainly consists of unauthorized access to computer
systems data alteration, data destruction, theft of intellectual
property. Cyber crime in the context of national security may involve
hacking, traditional espionage, or information warfare and related
activities.
The first recorded cyber crime took place in the year 1820
That is not surprising considering the fact that the
abacus, which is thought to be the earliest form of a
computer, has been around since 3500 B.C.
 The Computer as a Target : using a computer to
attack other computers.
 The computer as a weapon : using a computer to
commit real world crimes.
 Hacking
 Child pornography
 Denial of service attack
 Phishing
 Virus dissemination
 Computer vandalism
 Cyber terrorism
 Software piracy
Hacking in simple terms
means an illegal intrusion
into a computer system
and/or network. It is also
known as CRACKING.
Government websites are
the hot targets of the
hackers due to the press
coverage, it receives.
Hackers enjoy the media
coverage.
The Internet is being highly used by its abusers to reach
and abuse children sexually, worldwide. As more homes
have access to internet, more children would be using
the internet and more are the chances of falling victim to
the aggression of pedophiles.
 This is an act by the criminal, who floods the bandwidth
of the victims network or fills his e-mail box with spam
mail depriving him of the services he is entitled to access
or provide
Phishing is just one of the many frauds
on the Internet, trying to fool people
into parting with their money. Phishing
refers to the receipt of unsolicited
emails by customers of Financial
Institutions, requesting them to enter
their Username, Password or other
personal information to access their
Account for some reason.
The fraudster then has access to the
customer's online bank account and to
the funds contained in that account.
Malicious software that attaches itself to other software.
(virus, worms, Trojan Horse, web jacking, e-mail bombing
etc)
Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism. Transmitting
virus: These are programs that attach themselves to a file
and then circulate .
Terrorist attacks on the Internet is by distributed denial of
service attacks, hate websites and hate emails, attacks
on sensitive computer networks, etc. Technology savvy
terrorists are using 512-bit encryption, which is
impossible to decrypt.
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of
products intended to pass for the original.
Internet security is a branch
of computer security specifically
related to the Internet.
It's objective is to establish rules
and measure to use against
attacks over the Internet.
 Use antivirus software’s
 insert firewalls
 uninstall unnecessary software
 maintain backup
 check security settings
 Stay anonymous - choose a genderless screen name
 Never give your full name or address to strangers
 Don't respond to harassing or
negative messages (flames)
 Get out of uncomfortable or
hostile situations quickly
 Save offending messages
 Learn more about Internet
privacy
 The cyber security will defend us from critical attacks.
 It helps us to browse the safe website.
 Internet security process all the incoming and outgoing
data on our computer.
 security will defend from hacks and virus.
 The application of cyber security used in our PC needs
update every week.
 The security developers will update their database every
week once. Hence the new virus also deleted

More Related Content

What's hot

What's hot (20)

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Viewers also liked (6)

COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Security threats
Security threatsSecurity threats
Security threats
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 

Similar to Computer crime

CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 

Similar to Computer crime (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
cyber crime
cyber crime cyber crime
cyber crime
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 

More from Vishesh Dalal

E commerce - impact on credit card industry
E commerce - impact on credit card industryE commerce - impact on credit card industry
E commerce - impact on credit card industryVishesh Dalal
 
E learning-for-education
E learning-for-educationE learning-for-education
E learning-for-educationVishesh Dalal
 
robot, reconditioning, automation
robot, reconditioning, automation   robot, reconditioning, automation
robot, reconditioning, automation Vishesh Dalal
 
Cinepass investment-spend-plan
Cinepass investment-spend-planCinepass investment-spend-plan
Cinepass investment-spend-planVishesh Dalal
 
Blackberry 2013 project
Blackberry 2013 projectBlackberry 2013 project
Blackberry 2013 projectVishesh Dalal
 
Pearson education, greycell, blackberry
Pearson education, greycell, blackberryPearson education, greycell, blackberry
Pearson education, greycell, blackberryVishesh Dalal
 
Wars that india has fought
Wars that india has foughtWars that india has fought
Wars that india has foughtVishesh Dalal
 
The case study of michael dell
The case study of michael dellThe case study of michael dell
The case study of michael dellVishesh Dalal
 
Robot, reconditioning, automation
Robot, reconditioning, automationRobot, reconditioning, automation
Robot, reconditioning, automationVishesh Dalal
 

More from Vishesh Dalal (20)

E commerce - impact on credit card industry
E commerce - impact on credit card industryE commerce - impact on credit card industry
E commerce - impact on credit card industry
 
E learning-for-education
E learning-for-educationE learning-for-education
E learning-for-education
 
Reality shows final
Reality shows finalReality shows final
Reality shows final
 
robot, reconditioning, automation
robot, reconditioning, automation   robot, reconditioning, automation
robot, reconditioning, automation
 
Cinepass investment-spend-plan
Cinepass investment-spend-planCinepass investment-spend-plan
Cinepass investment-spend-plan
 
Vk engg
Vk enggVk engg
Vk engg
 
Education survery
Education  surveryEducation  survery
Education survery
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Final reality shows
Final reality showsFinal reality shows
Final reality shows
 
Swoc
SwocSwoc
Swoc
 
Blackberry 2013 project
Blackberry 2013 projectBlackberry 2013 project
Blackberry 2013 project
 
Netherlands
NetherlandsNetherlands
Netherlands
 
Pearson education, greycell, blackberry
Pearson education, greycell, blackberryPearson education, greycell, blackberry
Pearson education, greycell, blackberry
 
Brazil
BrazilBrazil
Brazil
 
Wars that india has fought
Wars that india has foughtWars that india has fought
Wars that india has fought
 
Aam aadmi party
Aam aadmi partyAam aadmi party
Aam aadmi party
 
The case study of michael dell
The case study of michael dellThe case study of michael dell
The case study of michael dell
 
Robot, reconditioning, automation
Robot, reconditioning, automationRobot, reconditioning, automation
Robot, reconditioning, automation
 
Netherlands
NetherlandsNetherlands
Netherlands
 
Dell case
Dell caseDell case
Dell case
 

Computer crime

  • 1.
  • 2. Computer Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities.
  • 3. The first recorded cyber crime took place in the year 1820 That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C.
  • 4.  The Computer as a Target : using a computer to attack other computers.  The computer as a weapon : using a computer to commit real world crimes.
  • 5.  Hacking  Child pornography  Denial of service attack  Phishing  Virus dissemination  Computer vandalism  Cyber terrorism  Software piracy
  • 6. Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
  • 7. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
  • 8.  This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 9. Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer's online bank account and to the funds contained in that account.
  • 10. Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc)
  • 11. Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate .
  • 12. Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 13. Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 14. Internet security is a branch of computer security specifically related to the Internet. It's objective is to establish rules and measure to use against attacks over the Internet.
  • 15.  Use antivirus software’s  insert firewalls  uninstall unnecessary software  maintain backup  check security settings  Stay anonymous - choose a genderless screen name  Never give your full name or address to strangers
  • 16.  Don't respond to harassing or negative messages (flames)  Get out of uncomfortable or hostile situations quickly  Save offending messages  Learn more about Internet privacy
  • 17.  The cyber security will defend us from critical attacks.  It helps us to browse the safe website.  Internet security process all the incoming and outgoing data on our computer.
  • 18.  security will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted