SlideShare a Scribd company logo
1 of 38
SHUBHAM GHIMIRE
B.SC. CSIT-6TH SEM
MBM COLLEGE
Introduction
•The Internet is growing rapidly. It has given rise to new opportunities in every field we can think
of like entertainment, business & education.
•There’re two sides to a coin. Internet also has it’s own disadvantage, i.e. Cyber crime.
Objectives
• To provide a general awareness of Cyber crime.
• To Recognize Cyber-crime methods.
• To know the importance of Cyber-laws(LOVE
BUG Suspects+ loss 10$ billion) .
• To learn how to keep away from being a victim .
Cyber Crime ??
• Crime committed using a computer and the internet to steal a
person’s identity or illegal imports or malicious programs.
• Cybercrime is nothing but where the computer used as an object or
subject of crime.
Why Should we know about CyberCrime?
• In this Tech-savvy world of 21st Century every one is engaged with internet,
through whatsapp, twitter, facebook, net banking & lots of other platforms are
there.
• And some criminal minded persons commit crimes here, which is included
under cybercrime.
• So we should be aware about crimes happening around in the cyber-space.
Cyber Criminals
•Person or Group who commits Cyber Crime using computers
•Hackers, criminals groups, hacktivists, virus writers, terrorists
History
• The first recorded cyber crime took place in the year1820.
• The first spam email took place in 1978 when it was sent over the Arpanet.
• The first VIRUS was installed on an Apple computer in 1982 .
Cyber Threat Evolution
Cyber Attack by percentage
Cyber Criminals used
The Computer as a Target : using a
computer to attack other computers. E.g
Hacking, virus/worm attacks, Dos attacks
etc.
The computer as a weapon : using a
computer to commit real world crimes.
E.g Cyber terrorism, credit card frauds,
Child pornography etc
Categories
• Against Person
• Against Property
• Against Government
Against person:
• Harassment via emails, cyber stalking, email spoofing, carding, assault by threat.
• The potential harm of such a crime to humanity can hardly be overstated.
Against Property:
• Cybercrimes against all forms of property.
• Unauthorized computer trespassing through cyberspace, computer vandalism, transmission of
harmful programs, and unauthorized possession of computerized information.
Against Government:
• Cyber Terrorism, Damaging critical information infrastructures.
• The growth of Internet has shown that the medium of Cyberspace is being used by individuals
and groups to the international governments as also to threaten the citizens of a country.
• This crime manifests itself into terrorism when an individual "cracks“ into a government or
military maintained website.
Types of Cyber Crime
Hacking
Hacking in simple terms means an illegal intrusion or unauthorized access to or
control over a computer system and/or network.
Denial of Service(DOS)
• Act by the criminal, who floods the bandwidth of the victims network or
Internet server is flooded with continuous requests so as to crash the server
• Its an attempt to make a machine or network resource unavailable to its
intended users
Virus Dissemination
Malicious software that attaches itself to other software. (virus, worms, Trojan
Horse, web jacking, e-mail bombing etc.)
Computer Vandalism
• Damaging or destroying data rather than stealing.
• Transmitting virus to destroy system files.
Software Piracy
• Theft of software through the illegal copying of genuine programs.
• The counterfeiting and distribution of products intended to pass for the original
Credit Card Fraud
Personal information stolen from a card, or the theft of a card itself, can be used
to commit fraud.
Fraudsters might use the information to purchase goods in your name or obtain
unauthorized funds from an account.
Net Extortion
Copying of someone’s confidential data in order to extort for huge amount.
Ransomware
Ransomware is a type of malware that prevents or limits users from accessing
their system, either by locking the system's screen or by locking the users' files
unless a ransom is paid.
Phishing
To request confidential information over the internet or by telephone under false pretenses in
order to fraudulently obtain credit card numbers, passwords, or other personal data.
Child Pornography
The Internet is being highly used by its abusers to reach and abuse children
sexually, worldwide.
Cyber Terrorism
• Use of Internet based attacks in terrorist activities. Terrorist attacks on the
Internet is by distributed denial of service attacks, hate websites and hate
emails, attacks on sensitive computer networks, etc.
• Technology savvy terrorists are using 512-bit encryption, which is impossible to
decrypt.
Cyber Crimes in Nepal
•Social Media Related Cyber Crime
•Piracy Related crime
•Fake Profile Marketing
•Threatening Using Email
•Website Hacking
•Unauthorized Access
•Online Business of Restricted Materials
Social Media Related Cyber Crime
Social Media related cyber crime in Nepal includes using Porn Content in social Media or
creating fake profiles to intentionally harm someone with the use of Facebook, Twitter,
Instagram or any social Media Platform
Fake Profile Marketing
Creating or using a fake profile, fake website or email to create a bad image or inappropriate
marketing is also considered as cybercrime.
Website Hacking
•Website Hacking means taking control from the website owner to a person who hacks the
website.
•Nowadays most of the government websites are attacked by hackers. Many governmental
websites including the president’s website were hacked.
•Anonymous #opnp
How to tackle these activities?
•Awareness is the first step in protecting yourself, your family and your business.
•Invest in Anti-virus, Firewall, and SPAM blocking software for your PC.
•Detect secure websites when conducting transactions online.
•Do NOT respond or act on emails sent from unknown sources.
Safety Tips to Cyber Crime
•Use antivirus software & insert firewalls
•Read Privacy policy carefully when you submit the data
through internet.
•Uninstall unnecessary software
•Maintain backup
•Check security settings
•Disable Remote Connectivity
•Use hard-to-guess passwords. Don’t use words found in
a dictionary. Remember that password cracking tools
exist.
•Never give your full name or address to strangers
•Learn more about Internet privacy
Cyber Security
•Internet security is a branch of computer security specifically related to the Internet.
•It's objective is to establish rules and measure to use against attacks over the Internet.
Cyber Security Advantages:
•The cyber security will defend us from critical attacks, hacks
and virus.
•It helps us to browse the safe website.
•Internet security process all the incoming and outgoing data
on our computer.
•The application of cyber security used in our PC needs update
every week.
•The security developers will update their database every week
once. Hence the new virus also deleted
Cyber Law
•There is absolutely no comprehensive law on Cybercrime any where in the world. This is reason
that the investigating agencies like FBI are finding the Cyberspace to be an extremely difficult
terrain.
•Cybercrimes fall into that grey area of Internet law which is neither fully nor partially covered by
the existing laws.
•However, countries are taking crucial measures to establish stringent laws on cybercrime.
•In Nepal,
 Electronic Transaction act 2061 BS (2005 AD)
 Information Technology Policy - 2000
Conclusion
•The key to protecting yourself is being aware.
• Cybercrime is about much more than hackers & not all cybercriminals are “hackers.”
•There is a whole other world that exists in cyberspace… make sure that your information travels
safely.
•Technology is destructive only in the hands of people who do not realize that they are one and
the same process as the universe.
•Cybercrime is a major problem – and growing .
•Stay Secure, Stay safe
Cyber Crime
Cyber Crime

More Related Content

What's hot

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 

What's hot (20)

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 

Viewers also liked (10)

Virtual Functions | Polymorphism | OOP
Virtual Functions | Polymorphism | OOPVirtual Functions | Polymorphism | OOP
Virtual Functions | Polymorphism | OOP
 
Cognitive Science Unit 4
Cognitive Science Unit 4Cognitive Science Unit 4
Cognitive Science Unit 4
 
Cognitive science Unit 1
Cognitive science Unit 1Cognitive science Unit 1
Cognitive science Unit 1
 
Cognitive Science Unit 2
Cognitive Science Unit 2Cognitive Science Unit 2
Cognitive Science Unit 2
 
IPSec | Computer Network
IPSec | Computer NetworkIPSec | Computer Network
IPSec | Computer Network
 
External Environment | Business Environment
External Environment | Business EnvironmentExternal Environment | Business Environment
External Environment | Business Environment
 
Case Study | Introduction to Management
Case Study | Introduction to Management Case Study | Introduction to Management
Case Study | Introduction to Management
 
Functional Parameter & Scheduling Hierarchy | Real Time System
Functional Parameter & Scheduling Hierarchy | Real Time SystemFunctional Parameter & Scheduling Hierarchy | Real Time System
Functional Parameter & Scheduling Hierarchy | Real Time System
 
Writing In Exam | technical Writing
Writing In Exam | technical WritingWriting In Exam | technical Writing
Writing In Exam | technical Writing
 
NGOs In Nepal | NGOs Directory
NGOs In Nepal | NGOs DirectoryNGOs In Nepal | NGOs Directory
NGOs In Nepal | NGOs Directory
 

Similar to Cyber Crime

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 

Similar to Cyber Crime (20)

Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 

Recently uploaded

Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
F
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 

Recently uploaded (20)

Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...
Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...
Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 

Cyber Crime

  • 2. Introduction •The Internet is growing rapidly. It has given rise to new opportunities in every field we can think of like entertainment, business & education. •There’re two sides to a coin. Internet also has it’s own disadvantage, i.e. Cyber crime.
  • 3. Objectives • To provide a general awareness of Cyber crime. • To Recognize Cyber-crime methods. • To know the importance of Cyber-laws(LOVE BUG Suspects+ loss 10$ billion) . • To learn how to keep away from being a victim .
  • 4. Cyber Crime ?? • Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. • Cybercrime is nothing but where the computer used as an object or subject of crime.
  • 5. Why Should we know about CyberCrime? • In this Tech-savvy world of 21st Century every one is engaged with internet, through whatsapp, twitter, facebook, net banking & lots of other platforms are there. • And some criminal minded persons commit crimes here, which is included under cybercrime. • So we should be aware about crimes happening around in the cyber-space.
  • 6. Cyber Criminals •Person or Group who commits Cyber Crime using computers •Hackers, criminals groups, hacktivists, virus writers, terrorists
  • 7. History • The first recorded cyber crime took place in the year1820. • The first spam email took place in 1978 when it was sent over the Arpanet. • The first VIRUS was installed on an Apple computer in 1982 .
  • 9. Cyber Attack by percentage
  • 10. Cyber Criminals used The Computer as a Target : using a computer to attack other computers. E.g Hacking, virus/worm attacks, Dos attacks etc. The computer as a weapon : using a computer to commit real world crimes. E.g Cyber terrorism, credit card frauds, Child pornography etc
  • 11. Categories • Against Person • Against Property • Against Government
  • 12. Against person: • Harassment via emails, cyber stalking, email spoofing, carding, assault by threat. • The potential harm of such a crime to humanity can hardly be overstated.
  • 13. Against Property: • Cybercrimes against all forms of property. • Unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs, and unauthorized possession of computerized information.
  • 14. Against Government: • Cyber Terrorism, Damaging critical information infrastructures. • The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to the international governments as also to threaten the citizens of a country. • This crime manifests itself into terrorism when an individual "cracks“ into a government or military maintained website.
  • 15. Types of Cyber Crime
  • 16. Hacking Hacking in simple terms means an illegal intrusion or unauthorized access to or control over a computer system and/or network.
  • 17. Denial of Service(DOS) • Act by the criminal, who floods the bandwidth of the victims network or Internet server is flooded with continuous requests so as to crash the server • Its an attempt to make a machine or network resource unavailable to its intended users
  • 18. Virus Dissemination Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 19. Computer Vandalism • Damaging or destroying data rather than stealing. • Transmitting virus to destroy system files.
  • 20. Software Piracy • Theft of software through the illegal copying of genuine programs. • The counterfeiting and distribution of products intended to pass for the original
  • 21. Credit Card Fraud Personal information stolen from a card, or the theft of a card itself, can be used to commit fraud. Fraudsters might use the information to purchase goods in your name or obtain unauthorized funds from an account.
  • 22. Net Extortion Copying of someone’s confidential data in order to extort for huge amount.
  • 23. Ransomware Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  • 24. Phishing To request confidential information over the internet or by telephone under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.
  • 25. Child Pornography The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide.
  • 26. Cyber Terrorism • Use of Internet based attacks in terrorist activities. Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. • Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 27. Cyber Crimes in Nepal •Social Media Related Cyber Crime •Piracy Related crime •Fake Profile Marketing •Threatening Using Email •Website Hacking •Unauthorized Access •Online Business of Restricted Materials
  • 28. Social Media Related Cyber Crime Social Media related cyber crime in Nepal includes using Porn Content in social Media or creating fake profiles to intentionally harm someone with the use of Facebook, Twitter, Instagram or any social Media Platform
  • 29. Fake Profile Marketing Creating or using a fake profile, fake website or email to create a bad image or inappropriate marketing is also considered as cybercrime.
  • 30. Website Hacking •Website Hacking means taking control from the website owner to a person who hacks the website. •Nowadays most of the government websites are attacked by hackers. Many governmental websites including the president’s website were hacked. •Anonymous #opnp
  • 31. How to tackle these activities? •Awareness is the first step in protecting yourself, your family and your business. •Invest in Anti-virus, Firewall, and SPAM blocking software for your PC. •Detect secure websites when conducting transactions online. •Do NOT respond or act on emails sent from unknown sources.
  • 32. Safety Tips to Cyber Crime •Use antivirus software & insert firewalls •Read Privacy policy carefully when you submit the data through internet. •Uninstall unnecessary software •Maintain backup •Check security settings •Disable Remote Connectivity •Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist. •Never give your full name or address to strangers •Learn more about Internet privacy
  • 33. Cyber Security •Internet security is a branch of computer security specifically related to the Internet. •It's objective is to establish rules and measure to use against attacks over the Internet.
  • 34. Cyber Security Advantages: •The cyber security will defend us from critical attacks, hacks and virus. •It helps us to browse the safe website. •Internet security process all the incoming and outgoing data on our computer. •The application of cyber security used in our PC needs update every week. •The security developers will update their database every week once. Hence the new virus also deleted
  • 35. Cyber Law •There is absolutely no comprehensive law on Cybercrime any where in the world. This is reason that the investigating agencies like FBI are finding the Cyberspace to be an extremely difficult terrain. •Cybercrimes fall into that grey area of Internet law which is neither fully nor partially covered by the existing laws. •However, countries are taking crucial measures to establish stringent laws on cybercrime. •In Nepal,  Electronic Transaction act 2061 BS (2005 AD)  Information Technology Policy - 2000
  • 36. Conclusion •The key to protecting yourself is being aware. • Cybercrime is about much more than hackers & not all cybercriminals are “hackers.” •There is a whole other world that exists in cyberspace… make sure that your information travels safely. •Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe. •Cybercrime is a major problem – and growing . •Stay Secure, Stay safe