SlideShare a Scribd company logo
Introduction
• Computer crime, or cybercrime, is any crime that involves
a computer and a network.
• The computer may have been used in the commission of a
crime, or it may be the target.
• Defination : "Offences that are committed against individuals
or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental
harm, or loss, to the victim directly or indirectly, using
modern telecommunication networks such as Internet (Chat
rooms, emails, notice boards and groups) and mobile phones
(SMS/MMS)". Such crimes may threaten a nation’s security
and financial health.
• Issues surrounding these types of crimes have become
high-profile, particularly those
surrounding hacking, copyright infringement, child
pornography, and child grooming.
• There are also problems
of privacy when confidential information is intercepted
or disclosed, lawfully or otherwise.
• Cybercrime against women:- Crimes targeted against
women with a motive to intentionally harm the victim
psychologically and physically, using modern
telecommunication networks such as internet and
mobile phones.
• A report (sponsored by UN) estimates that the
annual damage to the global economy is at $445
billion
Introduction
Fraud and financial crimes
• Computer fraud is any dishonest misrepresentation of fact
intended to let another to do or refrain from doing something
which causes loss.
• This requires little technical expertise and is common form of theft
by employees altering the data before entry or entering false data,
or by entering unauthorized instructions or using unauthorized
processes;
• Altering, destroying, suppressing, or stealing output, usually to
conceal unauthorized transactions. This is difficult to detect
Altering or deleting stored data;
• Other forms of fraud may be facilitated using computer systems,
including bank fraud, carding, identity theft, extortion, and theft of
classified information.
Cyber extortion
Cyber extortion occurs when a website, e-mail server, or computer system is
subjected to or threatened with repeated denial of service or other attacks by
hackers.
These hackers demand money in return for promising to stop the attacks and to
offer "protection". According to the Federal Bureau of Investigation, cyber
extortionists are increasingly attacking corporate websites and networks, crippling
their ability to operate and demanding payments to restore their service.
More than 20 cases are reported each month and many go unreported in order to
keep the victim's name out of the public domain. Perpetrators typically use
a distributed denial-of-service attack.
The Sony Pictures Entertainment hack was a release of
confidential data belonging to Sony Pictures Entertainment on
November 24, 2014. The data included personal information about
Sony Pictures employees and their families, e-mails between
employees, information about executive salaries at the company,
copies of (previously) unreleased Sony films, and other information.
The hackers called themselves the "Guardians of Peace" or "GOP"
and demanded the cancellation of the planned release of the
film The Interview, a comedy about a plot to assassinate North
Korean leader Kim Jong-un.
An Example of cyber extortion was the attack on Sony
Pictures of 2014.
Cyber terrorism
• Cyberterrorism is the act of Internet terrorism in terrorist activities,
including acts of deliberate, large-scale disruption of computer
networks, especially of personal computers attached to the Internet,
by the means of tools such as computer viruses.
• A cyber terrorist is someone who intimidates or coerces a government
or organization to advance his or her political or social objectives by
launching a computer-based attack against computers, networks, or
the information stored on them.
• As such, a simple propaganda in the Internet, that there will be bomb
attacks during the holidays can be considered cyber terrorism.
• As well there are also hacking activities directed towards individuals,
families, organized by groups within networks, tending to cause fear
among people, demonstrate power, collecting information relevant for
ruining peoples' lives, robberies, blackmailing etc.
• Cyberterrorism in general, can be defined as an act of
terrorism committed through the use of cyberspace or
computer resources.
• But there is a growing concern IT officials that such intrusions
are part of an organized effort by cyber terrorists, foreign
intelligence services, or other groups to map potential
security holes in critical systems.
However, there is an old saying that death or loss of property are
the side products of terrorism, the main purpose of such incidents
is to create terror in peoples mind. If any incident in the cyber
world can create terror, it may be called a Cyber-terrorism.
Obscene or offensive content
• The content of websites and other electronic communications
may be distasteful, obscene or offensive for a variety of reasons.
In some instances these communications may be legal.
• The extent to which these communications are unlawful varies
greatly between countries, and even within nations. It is a
sensitive area in which the courts can become involved in
arbitrating between groups with strong beliefs.
• One area of Internet pornography that has been the target of
the strongest efforts at curtailment is child pornography.
• The Internet is being highly used by its abusers to reach and
abuse children sexually, worldwide.
Harassment
Whereas content may be offensive in a non-specific way, harassment directs
obscenities and derogatory comments at specific individuals focusing for
example on gender, race, religion, nationality, sexual orientation.
This often occurs in chat rooms, through newsgroups, and by sending hate e-
mail to interested parties.
Harassment targeting women and children in the internet also includes revenge
pornography. There are instances where committing a crime using a computer
can lead to an enhanced sentence.
Drug trafficking
• "Drug traffickers are increasingly taking advantage of the Internet"
according to cyber authorities and personnel.
• To sell their illegal substances through encrypted e-mail and other
Internet Technology.
• Some drug traffickers arrange deals at internet cafes, use courier
Web sites to track illegal packages of pills, and swap recipes for
amphetamines in restricted-access chat rooms.
• The rise in Internet drug trades could also be attributed to the lack
of face-to-face communication. These virtual exchanges allow more
intimidated individuals to more comfortably purchase illegal drugs.
The sketchy effects that are often associated with drug trades are
severely minimized and the filtering process that comes with
physical interaction fades away.
• Due to easily exploitable laws, cybercriminals use developing countries in
order to evade detection and prosecution from law enforcement.
• In developing countries, such as the Philippines, laws against cybercrime
are weak or sometimes nonexistent.
• These weak laws allow cybercriminals to strike from international borders
and remain undetected.
• Even when identified, these criminals avoid being punished or extradited to
a country, such as the United States, that has developed laws that allow for
prosecution.
Legislation
While this proves difficult in some cases, agencies, such as the FBI, have
used deception and subterfuge to catch criminals. For example, two
Russian hackers had been evading the FBI for some time. The FBI set up a
fake computing company based in Seattle, Washington. They proceeded to
lure the two Russian men into the United States by offering them work
with this company. Upon completion of the interview, the suspects were
arrested outside of the building. Clever tricks like this are sometimes a
necessary part of catching cybercriminals when weak legislation makes it
impossible otherwise.
Legislation
Case law
Cyber crime rate worldwide
Thanking you

More Related Content

What's hot

Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
vimal kumar arora
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Jeet Swain
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
Online
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mahabubur Rahman
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Krishnav Ray Baruah
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 

What's hot (20)

Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Viewers also liked

Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion Menace
Zubair Baig
 
Cyber laws
Cyber lawsCyber laws
Cyber crime
Cyber crimeCyber crime
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes ...
16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes ...16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes ...
16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes ...
The Prajnya Trust
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
Faridah Husin
 
Crime against women
Crime against womenCrime against women
Crime against women
MADDY125
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
Scott Mills
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
Shaheda Afreen
 
創業贏家系列 詹翔霖教授-運動服務業創新創業輔導計畫簡章-學生組
創業贏家系列 詹翔霖教授-運動服務業創新創業輔導計畫簡章-學生組創業贏家系列 詹翔霖教授-運動服務業創新創業輔導計畫簡章-學生組
創業贏家系列 詹翔霖教授-運動服務業創新創業輔導計畫簡章-學生組
翔霖 詹
 
CEC Presentation: Disability 101
CEC Presentation: Disability 101CEC Presentation: Disability 101
CEC Presentation: Disability 101
Brian Kajiyama
 
Qcl 15-v4 [challenge-no 2]_[imnu]_[shubham gupta]
Qcl 15-v4 [challenge-no 2]_[imnu]_[shubham gupta]Qcl 15-v4 [challenge-no 2]_[imnu]_[shubham gupta]
Qcl 15-v4 [challenge-no 2]_[imnu]_[shubham gupta]
Shubham Gupta
 
حاشية القونوي على تفسير الإمام البيضاوي 16
حاشية القونوي على تفسير الإمام البيضاوي 16حاشية القونوي على تفسير الإمام البيضاوي 16
حاشية القونوي على تفسير الإمام البيضاوي 16
سمير بسيوني
 

Viewers also liked (20)

Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion Menace
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes ...
16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes ...16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes ...
16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes ...
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Crime against women
Crime against womenCrime against women
Crime against women
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
 
創業贏家系列 詹翔霖教授-運動服務業創新創業輔導計畫簡章-學生組
創業贏家系列 詹翔霖教授-運動服務業創新創業輔導計畫簡章-學生組創業贏家系列 詹翔霖教授-運動服務業創新創業輔導計畫簡章-學生組
創業贏家系列 詹翔霖教授-運動服務業創新創業輔導計畫簡章-學生組
 
CEC Presentation: Disability 101
CEC Presentation: Disability 101CEC Presentation: Disability 101
CEC Presentation: Disability 101
 
Qcl 15-v4 [challenge-no 2]_[imnu]_[shubham gupta]
Qcl 15-v4 [challenge-no 2]_[imnu]_[shubham gupta]Qcl 15-v4 [challenge-no 2]_[imnu]_[shubham gupta]
Qcl 15-v4 [challenge-no 2]_[imnu]_[shubham gupta]
 
حاشية القونوي على تفسير الإمام البيضاوي 16
حاشية القونوي على تفسير الإمام البيضاوي 16حاشية القونوي على تفسير الإمام البيضاوي 16
حاشية القونوي على تفسير الإمام البيضاوي 16
 
LANDNSEA DECK
LANDNSEA DECKLANDNSEA DECK
LANDNSEA DECK
 

Similar to cyber crime

cyber crime
 cyber crime  cyber crime
cyber crime
shobhapalpari123
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
Muhammad Haroon
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
Fahad Saleem
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
Arindam Sarkar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mukul Kumar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Fit Tri
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
vishalgohel12195
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Ashwini831102
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
chrixymae
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
mnm Lastopop
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
nanjeebarifa
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
jcgevana
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
ssusere71a07
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
Kartik Chhabra
 

Similar to cyber crime (20)

cyber crime
 cyber crime  cyber crime
cyber crime
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 

Recently uploaded

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 

Recently uploaded (20)

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 

cyber crime

  • 1.
  • 2. Introduction • Computer crime, or cybercrime, is any crime that involves a computer and a network. • The computer may have been used in the commission of a crime, or it may be the target. • Defination : "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health.
  • 3. • Issues surrounding these types of crimes have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. • There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise. • Cybercrime against women:- Crimes targeted against women with a motive to intentionally harm the victim psychologically and physically, using modern telecommunication networks such as internet and mobile phones. • A report (sponsored by UN) estimates that the annual damage to the global economy is at $445 billion Introduction
  • 4. Fraud and financial crimes • Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. • This requires little technical expertise and is common form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes; • Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions. This is difficult to detect Altering or deleting stored data; • Other forms of fraud may be facilitated using computer systems, including bank fraud, carding, identity theft, extortion, and theft of classified information.
  • 5. Cyber extortion Cyber extortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated denial of service or other attacks by hackers. These hackers demand money in return for promising to stop the attacks and to offer "protection". According to the Federal Bureau of Investigation, cyber extortionists are increasingly attacking corporate websites and networks, crippling their ability to operate and demanding payments to restore their service. More than 20 cases are reported each month and many go unreported in order to keep the victim's name out of the public domain. Perpetrators typically use a distributed denial-of-service attack.
  • 6. The Sony Pictures Entertainment hack was a release of confidential data belonging to Sony Pictures Entertainment on November 24, 2014. The data included personal information about Sony Pictures employees and their families, e-mails between employees, information about executive salaries at the company, copies of (previously) unreleased Sony films, and other information. The hackers called themselves the "Guardians of Peace" or "GOP" and demanded the cancellation of the planned release of the film The Interview, a comedy about a plot to assassinate North Korean leader Kim Jong-un. An Example of cyber extortion was the attack on Sony Pictures of 2014.
  • 7. Cyber terrorism • Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. • A cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching a computer-based attack against computers, networks, or the information stored on them. • As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyber terrorism. • As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc.
  • 8. • Cyberterrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources. • But there is a growing concern IT officials that such intrusions are part of an organized effort by cyber terrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. However, there is an old saying that death or loss of property are the side products of terrorism, the main purpose of such incidents is to create terror in peoples mind. If any incident in the cyber world can create terror, it may be called a Cyber-terrorism.
  • 9. Obscene or offensive content • The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be legal. • The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs. • One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography. • The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide.
  • 10. Harassment Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e- mail to interested parties. Harassment targeting women and children in the internet also includes revenge pornography. There are instances where committing a crime using a computer can lead to an enhanced sentence.
  • 11. Drug trafficking • "Drug traffickers are increasingly taking advantage of the Internet" according to cyber authorities and personnel. • To sell their illegal substances through encrypted e-mail and other Internet Technology. • Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms. • The rise in Internet drug trades could also be attributed to the lack of face-to-face communication. These virtual exchanges allow more intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are often associated with drug trades are severely minimized and the filtering process that comes with physical interaction fades away.
  • 12. • Due to easily exploitable laws, cybercriminals use developing countries in order to evade detection and prosecution from law enforcement. • In developing countries, such as the Philippines, laws against cybercrime are weak or sometimes nonexistent. • These weak laws allow cybercriminals to strike from international borders and remain undetected. • Even when identified, these criminals avoid being punished or extradited to a country, such as the United States, that has developed laws that allow for prosecution. Legislation
  • 13. While this proves difficult in some cases, agencies, such as the FBI, have used deception and subterfuge to catch criminals. For example, two Russian hackers had been evading the FBI for some time. The FBI set up a fake computing company based in Seattle, Washington. They proceeded to lure the two Russian men into the United States by offering them work with this company. Upon completion of the interview, the suspects were arrested outside of the building. Clever tricks like this are sometimes a necessary part of catching cybercriminals when weak legislation makes it impossible otherwise. Legislation
  • 15.
  • 16.
  • 17.
  • 18. Cyber crime rate worldwide