SlideShare a Scribd company logo
CYBER CRIME
AGAINST
PROPERTY
FORMAT OF THE PRESENTATION
 Before going on the topic cyber crime against property we must know about cyber crime. How it emerged?
 Then its types. All the types of cyber crime.
 Then, we will move onto our main topic cyber crime against property.
 And then its type and prevention.
We are moving from the age of information technology to the age of information security as now we are
more concerned about how to secure our information; the reason is the rapid growth in the graph of cyber
crimes1 or computer crimes. New methods of connectivity and communications are being developed with
the time, and, so are the ways to misuse them. People had started to depend on the machines rather on
themselves thus computer databases have taken the place of manual records which need to saved and
secured and also should be available at the very time they are required. An E has been added to almost all
the major or basic things which we do in our daily life like E-banking, E-shopping, and E-governance 2 etc.
Governments are also taking initiative to start and regulate their works via electronic methods or internet.
Doing the work on internet is no doubt very convenient, easy and much better way to do but at the same
time it needs to be safe and secured. The only thing why people hesitate to do their work online is because
due to the lack of trust in the system. We now and then read the news on newspapers or televisions about
the frauds that take place on the internet or through the internet. It is easier to break into a database and
steal the information on a computer as compared to a thief going and stealing the manual records from an
office. Information or the data is the main asset of an organization which we need to make sure that its
confidentiality, integrity and availability should be maintained. That is why, now a days companies are
making its employees aware about the possible risks and threats of the minor incidents which can lead to
a big disaster or attacks on their systems.
THE STORY
WHAT IS CYBERCRIME
Cyber crimes are the crimes in which a computer is either used as a
tool or a target but the main point lies in the fact that what can be
described as a computer or what are the things which can fall under
the definition of a computer. In India the IT act defines the computer
in the definition clause which helps a lot in solving the cyber crimes.
Cybercrime is a type of crime involving a computer or a computer
network. The computer may have been used in committing the
crime, or it may be the target. Cybercrime may harm someone's
security or finances. Internationally, both state and non-state actors
engage in cybercrimes, including espionage, financial theft, and
other cross-border crimes. Cybercrimes crossing international
borders and involving the actions of at least one nation-state are
sometimes referred to as cyberwarfare. Warren Buffett describes
cybercrime as the "number one problem with mankind" and said
that it "poses real risks to humanity".
TYPES OF CYBER CRIME
Cyber crime
against
individual
This involves
targeting a
person's
computer, data,
or identity, such
as hacking,
phishing, or
identity theft.
Cyber crime
against
society
This involves
harming the
public interest,
order, or security,
such as cyber
terrorism, hate
speech, etc.
Cyber crime
against
property
This involves
damaging or
stealing a
person's or an
organization's
property, such as
malware,
ransomware, or
piracy.
Cyber crime
against
organization
This involves
attacking an
organization's
network, system,
or data, such as
denial-of-service,
espionage, or
sabotage.
THE FOUR MAJOR CATEGORIES
Cyber
crime
against
individual
Cyber
crime
against
society
Cyber
crime
against
organizati
on
Cyber
crime
against
property
INTRODUCTION TO
CYBER CRIME AGAINST
PROPERTY
Cybercrime against property is probably the most common of the cybercrime classifications.
As the name suggests, this kind of crime involves cybercriminals targeting property, usually
money or other assets. Property cybercrime can be as serious as credit card theft or as
mundane as copyright infringement.
Most cyber criminals out there aren’t trying to attack you personally, but to take your money.
Even extreme measures like ransomware are just attempts to steal or extort cash from people
or businesses. That’s what makes cybercrimes against property so prevalent.
a
Though money is the most significant motivator for these crimes, it’s not the only one. This
classification of cybercrime includes other kinds of property as well, like stealing or destroying
intellectual property . Attacks that target your computer itself also fit into this category.
However, any online activity which basically offends human
sensibilities can be regarded as a cybercrime against property.
Cyber crime against property
CYBER
SQUATTING
CYBER
TRESPASSI-
-NG
CYBER
VANDALISM
INTELLECTUAL
PROPERTY
CRIMES
1st 3rd
2nd 4th
CYBER SQUATTING
Cybersquatting, typo squatting or domain squatting (also known as domain squatting) is the abusive
practice of registering and using an internet domain name that is identical or similar to trademarks, service
marks, personal names or company names with the bad faith intent of hijacking traffic for financial profit,
delivering malware payloads or stealing intellectual property. In popular terms, "cybersquatting" is the term
most frequently used to describe the deliberate, bad faith abusive registration of a domain name in
violation of trademark rights. However, precisely because of its popular currency, the term has different
meanings to different people. Some people, for example, include "warehousing", or the practice of
registering a collection of domain names corresponding to trademarks with the intention of selling the
registrations to the owners of the trademarks, within the notion of cybersquatting, while others distinguish
between the two terms. In the former definition, the cybersquatter may offer to sell the domain to the
person or company who owns a trademark contained within the name at an inflated price.
Similarly, some consider "cyberpiracy" to be interchangeable with "cybersquatting", whereas others
consider that the former term relates to violation of copyright in the content of websites, rather than to
abusive domain name registrations.
Because of the various interpretations of the term, World Intellectual Property Organization (WIPO), in a
1999 report, approved by its member states, considered it as the abusive registration of a domain name.
CYBER VANDALISM
Cyber vandalism is the deliberate, malicious destruction of digital property. It usually targets
websites and other tech products, but it can also be used to threaten individuals or
institutions. Cyber vandals use all sorts of tools to deface websites, delete files, take over
user accounts, or send spam and viruses.
Whereas traditional vandalism commonly involved the vandal leaving his or her mark for
everyone to see, cyber vandalism gives the perpetrator virtual anonymity by allowing them
to commit their crimes from anywhere at any time with relative impunity.
Cyber vandalism can generally be classified into three general types:
• Disruptive cyber vandalism: This type of cyber vandalism is designed to cause
interruption or interference with the normal functioning of a cyber property e.g. a
website.
• Destructive cyber vandalism: As the name suggests, this type of cyber vandalism is
intended to cause damage or destruction to a property.
• Defamatory cyber vandalism: This type of cyber vandalism involves posting false or
derogatory information about an individual or organization in an effort to damage their
reputation.
COMMON FORMS OF CYBER VANDALISM
Website
Defacement
Hackers maliciously
change content and design
of an existing website
without its owner’s
permission. It involves
altering web pages to
display upsetting, hateful
or otherwise distressing
messages, images, or
videos that flow entirely
against the owner’s
wishes. Such modifications
are typically achieved by
exploiting weaknesses in
the website's code.
Software
Sabotage
This involves deliberately
introducing bugs and viruses
into programs to disrupt
activity and can lead to
everything from data loss to
a complete wiping of the
source code of a program.
Software sabotage can also
involve the intentional
distribution of infected or
stolen software online which
can then be unknowingly
installed and used by
unsuspecting individuals,
leading to further
exploitation and damage.
Account
Hijacking
This is the act of taking over
someone else's account for
malicious purposes such as to
implant malware or post
obscene content.
Account hijackers exploit
weaknesses in computer
systems, networks, and online
security protocols for their
own benefit, often leaving the
victim with damaged
reputation or financial losses.
It is more common now than
ever with increasingly
sophisticated technology
available at anyone's
fingertips.
DNS Cache
Poisoning
DNS cache poisoning
corrupts the Domain Name
System (DNS) data stored
in the DNS server’s cache.
This vandalism allows
threat actors to manipulate
web traffic, as they can
redirect users to malicious
websites and illicit content.
Often, DNS cache
poisoning tricks users into
visiting false but
convincing websites that
are specially created by
hackers.
CYBER TRESPASSING
In common language the word 'trespass', means to go on another's property without consent. Though it is
ordinarily a civil wrong, if trespass is done with criminal intention, it is treated as criminal trespass. Thus, as
trespass actions are stranded in the idea of protecting an owner's control over his property and as even the
websites should be considered as a species of property. As like in the case of trespass, when just cracking is
there by the cracker, it is of a civil nature but once the intention to cause harm or rather damage the system is
proved, the liability becomes that of a penal nature. Now it is not just criminal trespass, which can be done by
cracking but cracking may also result in many other crimes which are mentioned in the Indian Penal Code,
1860. Like, if a cracker cracks a banking website and transfers money into his own account, this may constitute
a crime under Sec.378 of the Penal Code, which in this case may also be termed as Cyber Theft. The IT Act
tries to achieve this by providing civil and penal consequences for cracking and other wrongful activities. The
development of new-age technology in the form of computers and other such instruments is the cause of
rampant tort of cyber-trespass. The computer may be used as a tool in the following kinds of activity, e-mail
spoofing, forgery, cyber defamation, cyber stalking. It is necessarily the breach of personal information of a
person and his personal identity details, website databases etc. The computer may however be target for
unlawful acts in the most of the cases for e.g. unauthorized access to computer/ computer system/ computer
networks, theft of information contained in the electronic form, e-mail bombing, data didling, salami attacks, logic
bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the
computer system and other such confidential information.
INTELLECTUAL
PROPERTY CRIMES
Intellectual property crime is committed when
someone manufactures, sells or distributes counterfeit or
pirated goods, such as patents, trademarks, industrial
designs or literary and artistic works, for commercial
gain. Intellectual property (IP) crime also includes using a
particular brand, logo, design, piece of music or creative work
without the right to do so Intellectual property is protected by
trade marking, patents and copyright.
CREDITS: This presentation template was created by Slidesgo,
including icons by Flaticon, and infographics & images by Freepik
THANKS
BY :- DAKSH MEHTA
SCHOOL:- Mother Divine Public School
ROLL NO. :- 15
COMPUTER HOLIDAY HOMEWORK

More Related Content

What's hot

Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
Dr. Arun Verma
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Darshan Vithani
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
Devanshi Solanki
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
DINESH KAMBLE
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa
 

What's hot (20)

Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 

Similar to Cyber crime against property

Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
Cybercrime
CybercrimeCybercrime
Cybercrime
dhru shah
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rishabh Jain
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
RishabhJain916
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
Name parul
Name parulName parul
Name parul
Parul231
 
Name parul
Name parulName parul
Name parul
Parul231
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb21
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
sakshiyad2611
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
TanushreeChakraborty27
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 

Similar to Cyber crime against property (20)

Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 

Cyber crime against property

  • 2. FORMAT OF THE PRESENTATION  Before going on the topic cyber crime against property we must know about cyber crime. How it emerged?  Then its types. All the types of cyber crime.  Then, we will move onto our main topic cyber crime against property.  And then its type and prevention.
  • 3. We are moving from the age of information technology to the age of information security as now we are more concerned about how to secure our information; the reason is the rapid growth in the graph of cyber crimes1 or computer crimes. New methods of connectivity and communications are being developed with the time, and, so are the ways to misuse them. People had started to depend on the machines rather on themselves thus computer databases have taken the place of manual records which need to saved and secured and also should be available at the very time they are required. An E has been added to almost all the major or basic things which we do in our daily life like E-banking, E-shopping, and E-governance 2 etc. Governments are also taking initiative to start and regulate their works via electronic methods or internet. Doing the work on internet is no doubt very convenient, easy and much better way to do but at the same time it needs to be safe and secured. The only thing why people hesitate to do their work online is because due to the lack of trust in the system. We now and then read the news on newspapers or televisions about the frauds that take place on the internet or through the internet. It is easier to break into a database and steal the information on a computer as compared to a thief going and stealing the manual records from an office. Information or the data is the main asset of an organization which we need to make sure that its confidentiality, integrity and availability should be maintained. That is why, now a days companies are making its employees aware about the possible risks and threats of the minor incidents which can lead to a big disaster or attacks on their systems. THE STORY
  • 4. WHAT IS CYBERCRIME Cyber crimes are the crimes in which a computer is either used as a tool or a target but the main point lies in the fact that what can be described as a computer or what are the things which can fall under the definition of a computer. In India the IT act defines the computer in the definition clause which helps a lot in solving the cyber crimes. Cybercrime is a type of crime involving a computer or a computer network. The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone's security or finances. Internationally, both state and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Cybercrimes crossing international borders and involving the actions of at least one nation-state are sometimes referred to as cyberwarfare. Warren Buffett describes cybercrime as the "number one problem with mankind" and said that it "poses real risks to humanity".
  • 5. TYPES OF CYBER CRIME Cyber crime against individual This involves targeting a person's computer, data, or identity, such as hacking, phishing, or identity theft. Cyber crime against society This involves harming the public interest, order, or security, such as cyber terrorism, hate speech, etc. Cyber crime against property This involves damaging or stealing a person's or an organization's property, such as malware, ransomware, or piracy. Cyber crime against organization This involves attacking an organization's network, system, or data, such as denial-of-service, espionage, or sabotage.
  • 6. THE FOUR MAJOR CATEGORIES Cyber crime against individual Cyber crime against society Cyber crime against organizati on Cyber crime against property
  • 7. INTRODUCTION TO CYBER CRIME AGAINST PROPERTY
  • 8. Cybercrime against property is probably the most common of the cybercrime classifications. As the name suggests, this kind of crime involves cybercriminals targeting property, usually money or other assets. Property cybercrime can be as serious as credit card theft or as mundane as copyright infringement. Most cyber criminals out there aren’t trying to attack you personally, but to take your money. Even extreme measures like ransomware are just attempts to steal or extort cash from people or businesses. That’s what makes cybercrimes against property so prevalent. a Though money is the most significant motivator for these crimes, it’s not the only one. This classification of cybercrime includes other kinds of property as well, like stealing or destroying intellectual property . Attacks that target your computer itself also fit into this category. However, any online activity which basically offends human sensibilities can be regarded as a cybercrime against property.
  • 9. Cyber crime against property CYBER SQUATTING CYBER TRESPASSI- -NG CYBER VANDALISM INTELLECTUAL PROPERTY CRIMES 1st 3rd 2nd 4th
  • 10. CYBER SQUATTING Cybersquatting, typo squatting or domain squatting (also known as domain squatting) is the abusive practice of registering and using an internet domain name that is identical or similar to trademarks, service marks, personal names or company names with the bad faith intent of hijacking traffic for financial profit, delivering malware payloads or stealing intellectual property. In popular terms, "cybersquatting" is the term most frequently used to describe the deliberate, bad faith abusive registration of a domain name in violation of trademark rights. However, precisely because of its popular currency, the term has different meanings to different people. Some people, for example, include "warehousing", or the practice of registering a collection of domain names corresponding to trademarks with the intention of selling the registrations to the owners of the trademarks, within the notion of cybersquatting, while others distinguish between the two terms. In the former definition, the cybersquatter may offer to sell the domain to the person or company who owns a trademark contained within the name at an inflated price. Similarly, some consider "cyberpiracy" to be interchangeable with "cybersquatting", whereas others consider that the former term relates to violation of copyright in the content of websites, rather than to abusive domain name registrations. Because of the various interpretations of the term, World Intellectual Property Organization (WIPO), in a 1999 report, approved by its member states, considered it as the abusive registration of a domain name.
  • 11. CYBER VANDALISM Cyber vandalism is the deliberate, malicious destruction of digital property. It usually targets websites and other tech products, but it can also be used to threaten individuals or institutions. Cyber vandals use all sorts of tools to deface websites, delete files, take over user accounts, or send spam and viruses. Whereas traditional vandalism commonly involved the vandal leaving his or her mark for everyone to see, cyber vandalism gives the perpetrator virtual anonymity by allowing them to commit their crimes from anywhere at any time with relative impunity. Cyber vandalism can generally be classified into three general types: • Disruptive cyber vandalism: This type of cyber vandalism is designed to cause interruption or interference with the normal functioning of a cyber property e.g. a website. • Destructive cyber vandalism: As the name suggests, this type of cyber vandalism is intended to cause damage or destruction to a property. • Defamatory cyber vandalism: This type of cyber vandalism involves posting false or derogatory information about an individual or organization in an effort to damage their reputation.
  • 12. COMMON FORMS OF CYBER VANDALISM Website Defacement Hackers maliciously change content and design of an existing website without its owner’s permission. It involves altering web pages to display upsetting, hateful or otherwise distressing messages, images, or videos that flow entirely against the owner’s wishes. Such modifications are typically achieved by exploiting weaknesses in the website's code. Software Sabotage This involves deliberately introducing bugs and viruses into programs to disrupt activity and can lead to everything from data loss to a complete wiping of the source code of a program. Software sabotage can also involve the intentional distribution of infected or stolen software online which can then be unknowingly installed and used by unsuspecting individuals, leading to further exploitation and damage. Account Hijacking This is the act of taking over someone else's account for malicious purposes such as to implant malware or post obscene content. Account hijackers exploit weaknesses in computer systems, networks, and online security protocols for their own benefit, often leaving the victim with damaged reputation or financial losses. It is more common now than ever with increasingly sophisticated technology available at anyone's fingertips. DNS Cache Poisoning DNS cache poisoning corrupts the Domain Name System (DNS) data stored in the DNS server’s cache. This vandalism allows threat actors to manipulate web traffic, as they can redirect users to malicious websites and illicit content. Often, DNS cache poisoning tricks users into visiting false but convincing websites that are specially created by hackers.
  • 13. CYBER TRESPASSING In common language the word 'trespass', means to go on another's property without consent. Though it is ordinarily a civil wrong, if trespass is done with criminal intention, it is treated as criminal trespass. Thus, as trespass actions are stranded in the idea of protecting an owner's control over his property and as even the websites should be considered as a species of property. As like in the case of trespass, when just cracking is there by the cracker, it is of a civil nature but once the intention to cause harm or rather damage the system is proved, the liability becomes that of a penal nature. Now it is not just criminal trespass, which can be done by cracking but cracking may also result in many other crimes which are mentioned in the Indian Penal Code, 1860. Like, if a cracker cracks a banking website and transfers money into his own account, this may constitute a crime under Sec.378 of the Penal Code, which in this case may also be termed as Cyber Theft. The IT Act tries to achieve this by providing civil and penal consequences for cracking and other wrongful activities. The development of new-age technology in the form of computers and other such instruments is the cause of rampant tort of cyber-trespass. The computer may be used as a tool in the following kinds of activity, e-mail spoofing, forgery, cyber defamation, cyber stalking. It is necessarily the breach of personal information of a person and his personal identity details, website databases etc. The computer may however be target for unlawful acts in the most of the cases for e.g. unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, data didling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system and other such confidential information.
  • 14. INTELLECTUAL PROPERTY CRIMES Intellectual property crime is committed when someone manufactures, sells or distributes counterfeit or pirated goods, such as patents, trademarks, industrial designs or literary and artistic works, for commercial gain. Intellectual property (IP) crime also includes using a particular brand, logo, design, piece of music or creative work without the right to do so Intellectual property is protected by trade marking, patents and copyright.
  • 15. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, and infographics & images by Freepik THANKS BY :- DAKSH MEHTA SCHOOL:- Mother Divine Public School ROLL NO. :- 15 COMPUTER HOLIDAY HOMEWORK