SlideShare a Scribd company logo
Cyber Crime
Presented By:
Md : Jayed Hossain Jibon
B.Sc in SWE
Daffodil International University
Content
 What is Cyber Crime ?
 Characteristics of Cyber Crime
 How To Prevent Cyber Crimes
 Advantages of Cyber Crime
 Disadvantages of Cyber Crime
Friday, May 10, 2019
2
What is Cyber Crime ?
Friday, May 10, 2019
3
Characteristics of Cyber Crime
 Crossing of Jurisdictional Boundaries
 Severe Impacts
 Victims not disclosing victimization
 Criminals are young and smart with technology
Friday, May 10, 2019
4
Friday, May 10, 2019
5
How To Prevent Cyber Crimes
 Protect Your Computers
 Upgrade your Operating System
 Back-up your information regularly
 Use anti-virus software
 More than one e-mail accounts
 Ignore pop-ups
 Different site, different passwords
Friday, May 10, 2019
6
Improved security of cyberspace
 Increase in cyber defence
 Increase in cyber speed
 Allows more options to save data
 Better response time to national crisis
Advantages of Cyber Crime
Friday, May 10, 2019
7
Disadvantages of Cyber Crime
 Improved hacker speed and ability
 Interconnected computers
 Improved viruses, malware and worms
 Increase in "cyberwarfare" possibly
 More annomitty between hackers
Friday, May 10, 2019
8
Friday, May 10, 2019
9

More Related Content

What's hot

Cyber Space
Cyber SpaceCyber Space
Cyber Space
DINESH KAMBLE
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
Ayush Upadhyay
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
Bhagya Bgk
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
Raghav Chhabra
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
Aditya Singh
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
Avinash Katariya
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
OTHERS
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mahabubur Rahman
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
Internet Law Center
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 

What's hot (20)

Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
cyber crime
cyber crimecyber crime
cyber crime
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to cyber crime - slideshare by jayed hossain jibon

Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Assignment Help
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
ACAD1ITG
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
manoharparakh
 
cyber crime
cyber crimecyber crime
cyber crime
priya sehgal
 
Chp 9 lect - computer crimes surveys (shared)
Chp 9   lect  - computer crimes surveys (shared)Chp 9   lect  - computer crimes surveys (shared)
Chp 9 lect - computer crimes surveys (shared)
YUSRA FERNANDO
 
CYBER FORENSICS hai off off guard driving.pptx
CYBER FORENSICS hai off off guard driving.pptxCYBER FORENSICS hai off off guard driving.pptx
CYBER FORENSICS hai off off guard driving.pptx
21BIT009BenadickSamu
 
cyber crime
cyber crimecyber crime
cyber crimeMukund10
 
cybersecurity-awareness-training-for-employees.pptx
cybersecurity-awareness-training-for-employees.pptxcybersecurity-awareness-training-for-employees.pptx
cybersecurity-awareness-training-for-employees.pptx
NeerajOjha11
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Prachi ranpura
 
Viruses, Biometrics, Encryption
Viruses,  Biometrics,  EncryptionViruses,  Biometrics,  Encryption
Viruses, Biometrics, EncryptionBrain Young
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionBrain Young
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionBrain Young
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
kirtigoyal328
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
IJICTJOURNAL
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To YouRonald E. Laub Jr
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
Sanil Shrivastava
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
santhoshyadav23
 

Similar to cyber crime - slideshare by jayed hossain jibon (20)

Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
cyber crime
cyber crimecyber crime
cyber crime
 
Chp 9 lect - computer crimes surveys (shared)
Chp 9   lect  - computer crimes surveys (shared)Chp 9   lect  - computer crimes surveys (shared)
Chp 9 lect - computer crimes surveys (shared)
 
CYBER FORENSICS hai off off guard driving.pptx
CYBER FORENSICS hai off off guard driving.pptxCYBER FORENSICS hai off off guard driving.pptx
CYBER FORENSICS hai off off guard driving.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
cybersecurity-awareness-training-for-employees.pptx
cybersecurity-awareness-training-for-employees.pptxcybersecurity-awareness-training-for-employees.pptx
cybersecurity-awareness-training-for-employees.pptx
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Viruses, Biometrics, Encryption
Viruses,  Biometrics,  EncryptionViruses,  Biometrics,  Encryption
Viruses, Biometrics, Encryption
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To You
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 

More from Jayed Hossain Jibon

Black box testing - SlideShare jayed hossain jibon
Black box testing - SlideShare  jayed hossain jibonBlack box testing - SlideShare  jayed hossain jibon
Black box testing - SlideShare jayed hossain jibon
Jayed Hossain Jibon
 
Disk storage - SlideShare by jayed hossain jibon
Disk storage - SlideShare by jayed hossain jibonDisk storage - SlideShare by jayed hossain jibon
Disk storage - SlideShare by jayed hossain jibon
Jayed Hossain Jibon
 
Online learning system - Slideshare by jayed hossain jibon
Online learning system - Slideshare by  jayed hossain jibonOnline learning system - Slideshare by  jayed hossain jibon
Online learning system - Slideshare by jayed hossain jibon
Jayed Hossain Jibon
 
Lost and Found - by jayed hossain jibon
Lost and Found - by jayed hossain jibonLost and Found - by jayed hossain jibon
Lost and Found - by jayed hossain jibon
Jayed Hossain Jibon
 
Secure web application by jayed hossain jibon
Secure web application by jayed hossain jibonSecure web application by jayed hossain jibon
Secure web application by jayed hossain jibon
Jayed Hossain Jibon
 
Risk management - SlideShare
Risk management - SlideShareRisk management - SlideShare
Risk management - SlideShare
Jayed Hossain Jibon
 
Super shop management system
Super shop management systemSuper shop management system
Super shop management system
Jayed Hossain Jibon
 

More from Jayed Hossain Jibon (7)

Black box testing - SlideShare jayed hossain jibon
Black box testing - SlideShare  jayed hossain jibonBlack box testing - SlideShare  jayed hossain jibon
Black box testing - SlideShare jayed hossain jibon
 
Disk storage - SlideShare by jayed hossain jibon
Disk storage - SlideShare by jayed hossain jibonDisk storage - SlideShare by jayed hossain jibon
Disk storage - SlideShare by jayed hossain jibon
 
Online learning system - Slideshare by jayed hossain jibon
Online learning system - Slideshare by  jayed hossain jibonOnline learning system - Slideshare by  jayed hossain jibon
Online learning system - Slideshare by jayed hossain jibon
 
Lost and Found - by jayed hossain jibon
Lost and Found - by jayed hossain jibonLost and Found - by jayed hossain jibon
Lost and Found - by jayed hossain jibon
 
Secure web application by jayed hossain jibon
Secure web application by jayed hossain jibonSecure web application by jayed hossain jibon
Secure web application by jayed hossain jibon
 
Risk management - SlideShare
Risk management - SlideShareRisk management - SlideShare
Risk management - SlideShare
 
Super shop management system
Super shop management systemSuper shop management system
Super shop management system
 

Recently uploaded

H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 

Recently uploaded (20)

H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 

cyber crime - slideshare by jayed hossain jibon

  • 1. Cyber Crime Presented By: Md : Jayed Hossain Jibon B.Sc in SWE Daffodil International University
  • 2. Content  What is Cyber Crime ?  Characteristics of Cyber Crime  How To Prevent Cyber Crimes  Advantages of Cyber Crime  Disadvantages of Cyber Crime Friday, May 10, 2019 2
  • 3. What is Cyber Crime ? Friday, May 10, 2019 3
  • 4. Characteristics of Cyber Crime  Crossing of Jurisdictional Boundaries  Severe Impacts  Victims not disclosing victimization  Criminals are young and smart with technology Friday, May 10, 2019 4
  • 6. How To Prevent Cyber Crimes  Protect Your Computers  Upgrade your Operating System  Back-up your information regularly  Use anti-virus software  More than one e-mail accounts  Ignore pop-ups  Different site, different passwords Friday, May 10, 2019 6
  • 7. Improved security of cyberspace  Increase in cyber defence  Increase in cyber speed  Allows more options to save data  Better response time to national crisis Advantages of Cyber Crime Friday, May 10, 2019 7
  • 8. Disadvantages of Cyber Crime  Improved hacker speed and ability  Interconnected computers  Improved viruses, malware and worms  Increase in "cyberwarfare" possibly  More annomitty between hackers Friday, May 10, 2019 8