SlideShare a Scribd company logo
CYBER CRIME
BY:
ARKOPROVO DUTTA
BASUDEB PRADHAN
MALAY KANTI MAITY
SUBHAM SADHU
SHYAMAL PATRA
INTRODUCTION
• Every one connected through WhatsApp, Facebook, Twitter, net
banking and also other station
• Criminal minded persons commit crimes here
• Definition
• Histry
• Catagoris
• Types
• Damage
• Security and Law
• Advantage of security
• Prevention
• Conclusion
WHAT IS CYBER CRIME ?
• Crime that involves Computer and Internet
HISTORY OF CYBER CRIME
• The first recorded cyber crime took place In 1820 by Joseph-
Marie Jacquard
• First spam mail was took place in 3rd may in 1978
• The first hacking happened in 1978 when ‘Bell telephone‘
company started
• First virous was installed on apple computer in 1982
CATEGORIES
1. Computer as a terget
2. Computer as a weapon
TYPES OF CYBER CRIME
1. Fraud
2. Hacking
3. Computer Virus
4. Ransomware
5. Phishing
6. Social engineering
7. Malvertising
8. Cyberstalking
9. Spamming
10. Scamming
11. Child pornography
12. Child grooming
13. Copyright
14.Logic booms etc.
1) FRAUD
• Cheat/deceive a person.
2) HACKING
• The full or partial access of your system or website
3) COMPUTER VIRUS
• highly skilled program which spread all over the network
system and removable device and also the internet
• Copied in another device itself
4) RANSOMWARE
• Entering in your computer network encrypt files and
information
5) PHISHING
• Act as a legal company or organisation
• Use email to know about your credit card number and
password
6) SOCIAL ENGINEERING
• Know about your personal data ,passwords and other, like as
friend by phone and directcontact.
7) SPAMMING
• Send mail with virus
• Send mail with fake id and information
OTHER
Now days deceiveing the person cyber criminals
send a direct link of a virous file (automatically
download) or after entering the website ,they
copy your simcard
DAMAGE
1) ECONOMICALLY
DAMAGE
2) SOCIALLY
• Became frustrated and break in terms of mind
• Victims may be blackmailed
• Sometimes they attain suicide
SECURITY AND LAW
• some organisations works for the security guard in cyber space
• ISACA, ITU, ISSA, G8, Shanghai Cooperation Organisations, etc.
• ITA 2000, ITA 2008 ( in India )
ADVANTAGE OF CYBER SECURITY
• Defend us from critical attacks
• Brouse in safe website
• Security of incoming and outgoing data
PREVENTION
• Software update
• Antivirus, Firewall
• Don’t share personal data with strangers
• Learn more about Privacy and Security settings
• Don’t respond on unknown source
• Don’t share OTP
• Keep strong password with symbols
CONCLUSION
• Make sure that your information travels safe
• Keep safe, stay safe
THANK YOU
LIVE WELL , STAY HEALTHY

More Related Content

What's hot

Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Threats & Cyber Protection Measures
Threats & Cyber Protection MeasuresThreats & Cyber Protection Measures
Threats & Cyber Protection Measures
Shiva Bissessar
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
SajibeKanti
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
DEEKSHAASHOKA
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
Shamiul Lajib
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Sheetal Kandhare
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
sanjana mun
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
JoyBhowmik4
 
Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Cyber crime (do's&dont's)
Cyber crime (do's&dont's)
Nigel D'souza
 
Cyber crime by riyaz mulla
Cyber crime by riyaz mullaCyber crime by riyaz mulla
Cyber crime by riyaz mulla
Reyaz Abdul Mulla
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ratnesh Sharma
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
SultanaShaikh7
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
divyanigarg2
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
nehal patel
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
Raaz Shukla
 

What's hot (20)

Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Threats & Cyber Protection Measures
Threats & Cyber Protection MeasuresThreats & Cyber Protection Measures
Threats & Cyber Protection Measures
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Cyber crime (do's&dont's)
Cyber crime (do's&dont's)
 
Cyber crime by riyaz mulla
Cyber crime by riyaz mullaCyber crime by riyaz mulla
Cyber crime by riyaz mulla
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 

Similar to Cyber crime

Cyper crime
Cyper crimeCyper crime
Cyper crime
kirupasuchi1996
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Shareb Ismaeel
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
BigBoss647822
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
Hamza Khalid
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Jeet Swain
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
MayurSapkale7
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
Vicky Shah
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
SahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
SahilMishra81
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Fraz Ali
 
SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
pratikshapatil62556
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
DrPraveenKumar37
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
santhuana sg
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 

Similar to Cyber crime (20)

Cyper crime
Cyper crimeCyper crime
Cyper crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 

Cyber crime

  • 1. CYBER CRIME BY: ARKOPROVO DUTTA BASUDEB PRADHAN MALAY KANTI MAITY SUBHAM SADHU SHYAMAL PATRA
  • 2. INTRODUCTION • Every one connected through WhatsApp, Facebook, Twitter, net banking and also other station • Criminal minded persons commit crimes here
  • 3. • Definition • Histry • Catagoris • Types • Damage • Security and Law • Advantage of security • Prevention • Conclusion
  • 4. WHAT IS CYBER CRIME ? • Crime that involves Computer and Internet
  • 5. HISTORY OF CYBER CRIME • The first recorded cyber crime took place In 1820 by Joseph- Marie Jacquard • First spam mail was took place in 3rd may in 1978 • The first hacking happened in 1978 when ‘Bell telephone‘ company started • First virous was installed on apple computer in 1982
  • 6. CATEGORIES 1. Computer as a terget 2. Computer as a weapon
  • 7. TYPES OF CYBER CRIME 1. Fraud 2. Hacking 3. Computer Virus 4. Ransomware 5. Phishing 6. Social engineering 7. Malvertising 8. Cyberstalking 9. Spamming 10. Scamming 11. Child pornography 12. Child grooming 13. Copyright 14.Logic booms etc.
  • 9. 2) HACKING • The full or partial access of your system or website
  • 10. 3) COMPUTER VIRUS • highly skilled program which spread all over the network system and removable device and also the internet • Copied in another device itself
  • 11. 4) RANSOMWARE • Entering in your computer network encrypt files and information
  • 12. 5) PHISHING • Act as a legal company or organisation • Use email to know about your credit card number and password
  • 13. 6) SOCIAL ENGINEERING • Know about your personal data ,passwords and other, like as friend by phone and directcontact.
  • 14. 7) SPAMMING • Send mail with virus • Send mail with fake id and information
  • 15. OTHER Now days deceiveing the person cyber criminals send a direct link of a virous file (automatically download) or after entering the website ,they copy your simcard
  • 17. DAMAGE 2) SOCIALLY • Became frustrated and break in terms of mind • Victims may be blackmailed • Sometimes they attain suicide
  • 18. SECURITY AND LAW • some organisations works for the security guard in cyber space • ISACA, ITU, ISSA, G8, Shanghai Cooperation Organisations, etc. • ITA 2000, ITA 2008 ( in India )
  • 19. ADVANTAGE OF CYBER SECURITY • Defend us from critical attacks • Brouse in safe website • Security of incoming and outgoing data
  • 20. PREVENTION • Software update • Antivirus, Firewall • Don’t share personal data with strangers • Learn more about Privacy and Security settings • Don’t respond on unknown source • Don’t share OTP • Keep strong password with symbols
  • 21. CONCLUSION • Make sure that your information travels safe • Keep safe, stay safe
  • 22. THANK YOU LIVE WELL , STAY HEALTHY