SlideShare a Scribd company logo
CYBER CRIME
BY:
ARKOPROVO DUTTA
BASUDEB PRADHAN
MALAY KANTI MAITY
SUBHAM SADHU
SHYAMAL PATRA
INTRODUCTION
• Every one connected through WhatsApp, Facebook, Twitter, net
banking and also other station
• Criminal minded persons commit crimes here
• Definition
• Histry
• Catagoris
• Types
• Damage
• Security and Law
• Advantage of security
• Prevention
• Conclusion
WHAT IS CYBER CRIME ?
• Crime that involves Computer and Internet
HISTORY OF CYBER CRIME
• The first recorded cyber crime took place In 1820 by Joseph-
Marie Jacquard
• First spam mail was took place in 3rd may in 1978
• The first hacking happened in 1978 when ‘Bell telephone‘
company started
• First virous was installed on apple computer in 1982
CATEGORIES
1. Computer as a terget
2. Computer as a weapon
TYPES OF CYBER CRIME
1. Fraud
2. Hacking
3. Computer Virus
4. Ransomware
5. Phishing
6. Social engineering
7. Malvertising
8. Cyberstalking
9. Spamming
10. Scamming
11. Child pornography
12. Child grooming
13. Copyright
14.Logic booms etc.
1) FRAUD
• Cheat/deceive a person.
2) HACKING
• The full or partial access of your system or website
3) COMPUTER VIRUS
• highly skilled program which spread all over the network
system and removable device and also the internet
• Copied in another device itself
4) RANSOMWARE
• Entering in your computer network encrypt files and
information
5) PHISHING
• Act as a legal company or organisation
• Use email to know about your credit card number and
password
6) SOCIAL ENGINEERING
• Know about your personal data ,passwords and other, like as
friend by phone and directcontact.
7) SPAMMING
• Send mail with virus
• Send mail with fake id and information
OTHER
Now days deceiveing the person cyber criminals
send a direct link of a virous file (automatically
download) or after entering the website ,they
copy your simcard
DAMAGE
1) ECONOMICALLY
DAMAGE
2) SOCIALLY
• Became frustrated and break in terms of mind
• Victims may be blackmailed
• Sometimes they attain suicide
SECURITY AND LAW
• some organisations works for the security guard in cyber space
• ISACA, ITU, ISSA, G8, Shanghai Cooperation Organisations, etc.
• ITA 2000, ITA 2008 ( in India )
ADVANTAGE OF CYBER SECURITY
• Defend us from critical attacks
• Brouse in safe website
• Security of incoming and outgoing data
PREVENTION
• Software update
• Antivirus, Firewall
• Don’t share personal data with strangers
• Learn more about Privacy and Security settings
• Don’t respond on unknown source
• Don’t share OTP
• Keep strong password with symbols
CONCLUSION
• Make sure that your information travels safe
• Keep safe, stay safe
THANK YOU

More Related Content

What's hot

Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Threats & Cyber Protection Measures
Threats & Cyber Protection MeasuresThreats & Cyber Protection Measures
Threats & Cyber Protection Measures
Shiva Bissessar
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
SajibeKanti
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
DEEKSHAASHOKA
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
Shamiul Lajib
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
sanjana mun
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Sheetal Kandhare
 
Cyber crime by riyaz mulla
Cyber crime by riyaz mullaCyber crime by riyaz mulla
Cyber crime by riyaz mulla
Reyaz Abdul Mulla
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
JoyBhowmik4
 
Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Cyber crime (do's&dont's)
Cyber crime (do's&dont's)
Nigel D'souza
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ratnesh Sharma
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
nehal patel
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
divyanigarg2
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
AashiGupta46
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
Prashant Sharma
 

What's hot (20)

Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Threats & Cyber Protection Measures
Threats & Cyber Protection MeasuresThreats & Cyber Protection Measures
Threats & Cyber Protection Measures
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber crime by riyaz mulla
Cyber crime by riyaz mullaCyber crime by riyaz mulla
Cyber crime by riyaz mulla
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Cyber crime (do's&dont's)
Cyber crime (do's&dont's)
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 

Similar to Cyber crime

Cyper crime
Cyper crimeCyper crime
Cyper crime
kirupasuchi1996
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Shareb Ismaeel
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
BigBoss647822
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
Hamza Khalid
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Jeet Swain
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
MayurSapkale7
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
Vicky Shah
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
Raaz Shukla
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
pratikshapatil62556
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Fraz Ali
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
DrPraveenKumar37
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
SahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
SahilMishra81
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
santhuana sg
 

Similar to Cyber crime (20)

Cyper crime
Cyper crimeCyper crime
Cyper crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 

Recently uploaded

一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 

Recently uploaded (11)

一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 

Cyber crime

  • 1. CYBER CRIME BY: ARKOPROVO DUTTA BASUDEB PRADHAN MALAY KANTI MAITY SUBHAM SADHU SHYAMAL PATRA
  • 2. INTRODUCTION • Every one connected through WhatsApp, Facebook, Twitter, net banking and also other station • Criminal minded persons commit crimes here
  • 3. • Definition • Histry • Catagoris • Types • Damage • Security and Law • Advantage of security • Prevention • Conclusion
  • 4. WHAT IS CYBER CRIME ? • Crime that involves Computer and Internet
  • 5. HISTORY OF CYBER CRIME • The first recorded cyber crime took place In 1820 by Joseph- Marie Jacquard • First spam mail was took place in 3rd may in 1978 • The first hacking happened in 1978 when ‘Bell telephone‘ company started • First virous was installed on apple computer in 1982
  • 6. CATEGORIES 1. Computer as a terget 2. Computer as a weapon
  • 7. TYPES OF CYBER CRIME 1. Fraud 2. Hacking 3. Computer Virus 4. Ransomware 5. Phishing 6. Social engineering 7. Malvertising 8. Cyberstalking 9. Spamming 10. Scamming 11. Child pornography 12. Child grooming 13. Copyright 14.Logic booms etc.
  • 9. 2) HACKING • The full or partial access of your system or website
  • 10. 3) COMPUTER VIRUS • highly skilled program which spread all over the network system and removable device and also the internet • Copied in another device itself
  • 11. 4) RANSOMWARE • Entering in your computer network encrypt files and information
  • 12. 5) PHISHING • Act as a legal company or organisation • Use email to know about your credit card number and password
  • 13. 6) SOCIAL ENGINEERING • Know about your personal data ,passwords and other, like as friend by phone and directcontact.
  • 14. 7) SPAMMING • Send mail with virus • Send mail with fake id and information
  • 15. OTHER Now days deceiveing the person cyber criminals send a direct link of a virous file (automatically download) or after entering the website ,they copy your simcard
  • 17. DAMAGE 2) SOCIALLY • Became frustrated and break in terms of mind • Victims may be blackmailed • Sometimes they attain suicide
  • 18. SECURITY AND LAW • some organisations works for the security guard in cyber space • ISACA, ITU, ISSA, G8, Shanghai Cooperation Organisations, etc. • ITA 2000, ITA 2008 ( in India )
  • 19. ADVANTAGE OF CYBER SECURITY • Defend us from critical attacks • Brouse in safe website • Security of incoming and outgoing data
  • 20. PREVENTION • Software update • Antivirus, Firewall • Don’t share personal data with strangers • Learn more about Privacy and Security settings • Don’t respond on unknown source • Don’t share OTP • Keep strong password with symbols
  • 21. CONCLUSION • Make sure that your information travels safe • Keep safe, stay safe