SlideShare a Scribd company logo
RAMESH SIDH
IPCC REG. NO. CRO - 0478387
BATCH COMMENCEMENT DATE: 24-NOV-2014
PROJECT TOPIC: CYBER CRIME AND FRAUD
SUBMITTED BY:
ITT CENTRE NAME: BIKANER BRANCH OF CIRC OF ICAI
1
2
3
CYBER CRIME AND FRAUDCYBER CRIME AND FRAUD
4
5
INDEX
Submitted By :- Ramesh Sidh
ITT Reg No.: Bkn/2014-15/089
6
• Why Should We Know About Cyber Crime?.............................8
• What Is Cyber Crime?...............................................................9
• History………………………………………………………………………………..10
• Definition Of Fraud……………………………………………………………..11
• Categories Of Cyber Crime ………………………………………………….12
• Weapons Of Cyber Crime And Fraud……………………………………13
• Cyber Crimes Against Persons……………………………………………..14
• Cyber Crimes Against Property ………………………………………..…15
• Cyber Crimes Against Government………………………………….….16
• An Instance Of Cyber Terrorism……………………………………..……17
• Cyber Crimes Against Society………………………………………………18
• Example Of Cyber Crime…………………………………………………….19-26
• Conclusion………………………………………………………………………….27
• Bibliography……………………………………………………………………….28
Submitted By :- Ramesh Sidh
Itt Reg No.: Bkn/2014-15/089 7
Submitted By :- Ramesh Sidh
Itt Reg No.: Bkn/2014-15/089 8
Why Should we know about Cyber-Crime?
In This Tech-savvy World Of 21st
Century
Every One Is Engaged With Internet,
Through Whatsapp, Twitter, Facebook, Net-
banking & Lots Of Other Platforms Are
There.
And Some Criminal Minded Persons Commit
Crimes Here, Which Is Included Under Cyber-
crime.
Submitted By :- Ramesh Sidh
Itt Reg No.: Bkn/2014-15/089
WHAT IS CYBER CRIME ?
LET ME TELL YOU ?
Cyber Crime Is Nothing But Where The Computer Used As An
Object Or Subject Of Crime.
Crime Commited Using Computer And Internet
Criminal Activites That Make Use Of Computers Or Networks.
Submitted By :- Ramesh Sidh
ITT Reg No.: Bkn/2014-15/089 10
•The first recorded cyber crime was recorded in the year
1820.
•The first spam email took place in 1978 when it was sent
over the Arpanet.
•The first Virus was installed on an Apple Computer in
1982.
submitted by :- Ramesh Sidh
ITT REG NO.: BKN/2014-15/089 11
Defintion of Fraud
• Black’s Law Dictionary defines fraud as:
– …All Multifarious Means Which Human Ingenuity
Can Devise, And Which Are Resorted To By One
Individual To Get An Advantage Over Another By
False Suggestions Or Suppression Of The Trust. It
Includes All Surprise, Trick, Cunning Or
Dissembling, And Any Unfair Way By Which
Another Is Cheated.
Submitted By :- Ramesh Sidh
Itt Reg No.: Bkn/2014-15/089 12
CATEGORIES OF CYBER CRIME
• Cyber Crimes Against Persons.
• Cyber Crimes Against Property.
• Cyber Crimes Against Government.
• Cyber Crimes Against Society.
• Cyber Crimes Against Organisation
Submitted By :- Ramesh Sidh
Itt Reg No.: Bkn/2014-15/089 13
Weapons of Cyber Crime and Fraud
• Hacking
• Data Diddling
• Denial Of Service Attack
• Email Bombing
• Trojan Attack
• Web Jacking
• Virus/Worm Attacks
• Salami Attacks
• Phishing
• Spamming
• Cyber Stalking
submitted by :- Ramesh Sidh
ITT REG NO.: BKN/2014-15/089 14
CYBER CRIMES AGAINST PERSONS
• Harassment Via E-mails
• Hacking
• E-mail / SMS Spoofing
• Carding
• Assault By Threat
submitted by :- Ramesh Sidh
ITT REG NO.: BKN/2014-15/089 15
CYBER CRIMES AGAINST PROPERTY
• Intellectual Property Crimes
• Cyber Squatting
• Cyber Vandalism
• Transmitting Virus
• Internet Time Thefts
submitted by :- Ramesh Sidh
ITT REG NO.: BKN/2014-15/089 16
Cyber crimes against government
•Hacking into computer
systems.
•Introducing viruses to
vulnerable networks.
•Website Defacing.
•Denial-of-Service(DoS)
attacks.
•Terroristic threats made
via e-mail.
submitted by :- Ramesh Sidh
ITT REG NO.: BKN/2014-15/089 17
An Instance of Cyber terrorism
 Ahmedabad Bomb Blast(26-07-08)
• A Mail With Id Alarbi_gujrat@
Yahoo.Com Was Being Sent By A
Group Of Terrorists.
• Person Named Kenneth Haywood’s
Unsecured Wifi Router In His House
Was Being Misused By Terrorists.
• 3 More Mails Were Sent After The
Blast With The Same Misuse Of
Unsecured Wifi Routers.
submitted by :- Ramesh Sidh
ITT REG NO.: BKN/2014-15/089 18
CYBER CRIMES AGAINST SOCIETY
• Pornography
• Cyber Trafficking
• Online Gambling
• Forgery
submitted by :- Ramesh Sidh
ITT REG NO.: BKN/2014-15/089 19
Phishing:
Phishing Refers To The Receipt Of Unsolicited Emails By
Customers Of Financial Institutions, Requesting Them To
Enter Their Username, Password Or Other Personal
Information To Access Their Account For Some Reason. The
Fraudster Then Has Access To The Customer’s Online Bank
Account And To The Funds Contained In That Account.
submitted by :- Ramesh Sidh
Itt Reg No.: Bkn/2014-15/089 20
Salami attacks:
•This kind of crime is normally prevalent in the financial
institutions or for the purpose of committing financial crimes.
•An important feature of this type of offence is that the
alteration is so small that it would normally go unnoticed.
E.G. Criminal Makes Such Program That Deducts Small
Amount Like Rs. 2.50 Per Month From The Account Of All
The Customer Of The Bank And Deposit The Same In His
Account.
In This Case No Account Holder Will Approach The Bank
For Such Small Amount But Criminal Gains Huge Amount.
submitted by :- Ramesh Sidh
Itt Reg No.: Bkn/2014-15/089 21
Virus/ Worm Attacks:
•They usually affect the data on a computer, either by altering or
deleting it.
•Worms unlike viruses do not need the host to attach themselves
to.
•They merely make functional copies of themselves and do this
repeatedly till they eat up all the available space on the computer’s
memory.
submitted by :- Ramesh Sidh
Itt Reg No.: Bkn/2014-15/089 22
Hacking:
Unauthorized
access to any
computer
systems or
networks is
known as
‘HACKING’.
That is
accessing the
information of
others without
proper
authorization.
submitted by :- Ramesh Sidh
Itt Reg No.: Bkn/2014-15/089 23
DENIAL OF SERVICE ATTACK
This is an act by the
criminal who floods
the bandwidth of the
victim’s network or
fills his e-mail box
with spam mail
depriving him of the
services he is entitled
to access or provide
Submitted by :- ramesh sidh
ITT reg no.: Bkn/2014-15/089 24
• The Internet is being highly used by its abusers to reach and
abuse children sexually, worldwide. As more homes have
access to internet, more children would be using the internet
and more are the chances of falling victim to the aggression of
pedophiles.
Submitted By :- Ramesh Sidh
ITT Reg No.: Bkn/2014-15/089 25
This is a kind of online
harassment wherein the
victim is subjected to a
barrage of online messages
and emails. Cyber stalking is
a technology based attack
which can take many forms,
including: harassment,
embarrassment and
humiliation of the victim.
Submitted By :- Ramesh Sidh
ITT Reg No.: Bkn/2014-15/089 26
Trojan Attacks:
This term has it’s origin in the
word ‘Trojan Horse’. In
software field this means an
unauthorised program, which
passively gains control over
another’s computer by
representing itself as an
authorized program. The most
common form of installing a
Trojan is through e-mail.
CONCLUSION
Cybercrime is indeed getting the recognition it
deserves. However, it is not going to restricted
that easily . In fact , it is highly likely that cyber
crime and its hackers will continue developing
and upgrading to stay ahead of the law.
So, to make us a safer we must need cyber
security.
Submitted By :- Ramesh Sidh
ITT Reg No.: Bkn/2014-15/089 27
Submitted By :- Ramesh Sidh
ITT Reg No.: Bkn/2014-15/089 28
• https://www.google.co.in
• http://en.wikipedia.org
• http://www.legalindia.in
• http://www.e-mudhra.com
• Miss sonali jain (ITT Faculty)
• Self efforts
submitted by :- Ramesh Sidh
Itt Reg No.: Bkn/2014-15/089 29

More Related Content

What's hot

Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mahabubur Rahman
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Surakshya Poudel
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber law
Cyber lawCyber law
Cyber law
Umang Maheshwari
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
Onkar1431
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
Cyber Crime
Cyber CrimeCyber Crime

What's hot (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Viewers also liked

Business report ppt 2
Business report ppt 2Business report ppt 2
Business report ppt 2
Mardelyn Dumayas
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
atifkhanniazi
 
Crime in-pakistan-research-report
Crime in-pakistan-research-reportCrime in-pakistan-research-report
Crime in-pakistan-research-report
hayatabad1
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Daniel Dufourt
 
web technology and soical networking
web technology and soical networkingweb technology and soical networking
web technology and soical networking
Vijay Bansal
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
Varun Mathur
 
Social Networking and Youth Work
Social Networking and Youth WorkSocial Networking and Youth Work
Social Networking and Youth WorkJess Nichols
 
2014 Business report writing
2014 Business  report writing2014 Business  report writing
2014 Business report writing
Martin McMorrow
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Projecttsdikshit
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Computer network Report
Computer network ReportComputer network Report
Computer network ReportAmitoj Kaur
 
Digital in 2016 Executive Summary
Digital in 2016 Executive SummaryDigital in 2016 Executive Summary
Digital in 2016 Executive Summary
We Are Social Singapore
 

Viewers also liked (20)

Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Business report ppt 2
Business report ppt 2Business report ppt 2
Business report ppt 2
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Crime in-pakistan-research-report
Crime in-pakistan-research-reportCrime in-pakistan-research-report
Crime in-pakistan-research-report
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
web technology and soical networking
web technology and soical networkingweb technology and soical networking
web technology and soical networking
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Social Networking and Youth Work
Social Networking and Youth WorkSocial Networking and Youth Work
Social Networking and Youth Work
 
2014 Business report writing
2014 Business  report writing2014 Business  report writing
2014 Business report writing
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Computer network Report
Computer network ReportComputer network Report
Computer network Report
 
Crime definition
Crime definitionCrime definition
Crime definition
 
Digital in 2016 Executive Summary
Digital in 2016 Executive SummaryDigital in 2016 Executive Summary
Digital in 2016 Executive Summary
 

Similar to Cyber crime and fraud

2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
Sanil Shrivastava
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
praveen1792
 
Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
Deepak Kumar (D3)
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
Goutama Bachtiar
 
cyber_crim.pptx
cyber_crim.pptxcyber_crim.pptx
cyber_crim.pptx
Vishwanath976500
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
silas Sargunam
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
KavithaK23
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
Blake Morgan LLP
 
Women in law enforcement 2014
Women in law enforcement 2014Women in law enforcement 2014
Women in law enforcement 2014Jacqueline Fick
 
ENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptxENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptx
easy web solution
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
phishing attack - man in the middle.pptx
phishing attack - man in the middle.pptxphishing attack - man in the middle.pptx
phishing attack - man in the middle.pptx
2021000444deepak
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb21
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
Goutama Bachtiar
 

Similar to Cyber crime and fraud (20)

2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
cyber_crim.pptx
cyber_crim.pptxcyber_crim.pptx
cyber_crim.pptx
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 
Women in law enforcement 2014
Women in law enforcement 2014Women in law enforcement 2014
Women in law enforcement 2014
 
ENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptxENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
phishing attack - man in the middle.pptx
phishing attack - man in the middle.pptxphishing attack - man in the middle.pptx
phishing attack - man in the middle.pptx
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
 

Recently uploaded

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 

Recently uploaded (20)

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 

Cyber crime and fraud

  • 1. RAMESH SIDH IPCC REG. NO. CRO - 0478387 BATCH COMMENCEMENT DATE: 24-NOV-2014 PROJECT TOPIC: CYBER CRIME AND FRAUD SUBMITTED BY: ITT CENTRE NAME: BIKANER BRANCH OF CIRC OF ICAI 1
  • 2. 2
  • 3. 3
  • 4. CYBER CRIME AND FRAUDCYBER CRIME AND FRAUD 4
  • 5. 5
  • 6. INDEX Submitted By :- Ramesh Sidh ITT Reg No.: Bkn/2014-15/089 6 • Why Should We Know About Cyber Crime?.............................8 • What Is Cyber Crime?...............................................................9 • History………………………………………………………………………………..10 • Definition Of Fraud……………………………………………………………..11 • Categories Of Cyber Crime ………………………………………………….12 • Weapons Of Cyber Crime And Fraud……………………………………13 • Cyber Crimes Against Persons……………………………………………..14 • Cyber Crimes Against Property ………………………………………..…15 • Cyber Crimes Against Government………………………………….….16 • An Instance Of Cyber Terrorism……………………………………..……17 • Cyber Crimes Against Society………………………………………………18 • Example Of Cyber Crime…………………………………………………….19-26 • Conclusion………………………………………………………………………….27 • Bibliography……………………………………………………………………….28
  • 7. Submitted By :- Ramesh Sidh Itt Reg No.: Bkn/2014-15/089 7
  • 8. Submitted By :- Ramesh Sidh Itt Reg No.: Bkn/2014-15/089 8 Why Should we know about Cyber-Crime? In This Tech-savvy World Of 21st Century Every One Is Engaged With Internet, Through Whatsapp, Twitter, Facebook, Net- banking & Lots Of Other Platforms Are There. And Some Criminal Minded Persons Commit Crimes Here, Which Is Included Under Cyber- crime.
  • 9. Submitted By :- Ramesh Sidh Itt Reg No.: Bkn/2014-15/089 WHAT IS CYBER CRIME ? LET ME TELL YOU ? Cyber Crime Is Nothing But Where The Computer Used As An Object Or Subject Of Crime. Crime Commited Using Computer And Internet Criminal Activites That Make Use Of Computers Or Networks.
  • 10. Submitted By :- Ramesh Sidh ITT Reg No.: Bkn/2014-15/089 10 •The first recorded cyber crime was recorded in the year 1820. •The first spam email took place in 1978 when it was sent over the Arpanet. •The first Virus was installed on an Apple Computer in 1982.
  • 11. submitted by :- Ramesh Sidh ITT REG NO.: BKN/2014-15/089 11 Defintion of Fraud • Black’s Law Dictionary defines fraud as: – …All Multifarious Means Which Human Ingenuity Can Devise, And Which Are Resorted To By One Individual To Get An Advantage Over Another By False Suggestions Or Suppression Of The Trust. It Includes All Surprise, Trick, Cunning Or Dissembling, And Any Unfair Way By Which Another Is Cheated.
  • 12. Submitted By :- Ramesh Sidh Itt Reg No.: Bkn/2014-15/089 12 CATEGORIES OF CYBER CRIME • Cyber Crimes Against Persons. • Cyber Crimes Against Property. • Cyber Crimes Against Government. • Cyber Crimes Against Society. • Cyber Crimes Against Organisation
  • 13. Submitted By :- Ramesh Sidh Itt Reg No.: Bkn/2014-15/089 13 Weapons of Cyber Crime and Fraud • Hacking • Data Diddling • Denial Of Service Attack • Email Bombing • Trojan Attack • Web Jacking • Virus/Worm Attacks • Salami Attacks • Phishing • Spamming • Cyber Stalking
  • 14. submitted by :- Ramesh Sidh ITT REG NO.: BKN/2014-15/089 14 CYBER CRIMES AGAINST PERSONS • Harassment Via E-mails • Hacking • E-mail / SMS Spoofing • Carding • Assault By Threat
  • 15. submitted by :- Ramesh Sidh ITT REG NO.: BKN/2014-15/089 15 CYBER CRIMES AGAINST PROPERTY • Intellectual Property Crimes • Cyber Squatting • Cyber Vandalism • Transmitting Virus • Internet Time Thefts
  • 16. submitted by :- Ramesh Sidh ITT REG NO.: BKN/2014-15/089 16 Cyber crimes against government •Hacking into computer systems. •Introducing viruses to vulnerable networks. •Website Defacing. •Denial-of-Service(DoS) attacks. •Terroristic threats made via e-mail.
  • 17. submitted by :- Ramesh Sidh ITT REG NO.: BKN/2014-15/089 17 An Instance of Cyber terrorism  Ahmedabad Bomb Blast(26-07-08) • A Mail With Id Alarbi_gujrat@ Yahoo.Com Was Being Sent By A Group Of Terrorists. • Person Named Kenneth Haywood’s Unsecured Wifi Router In His House Was Being Misused By Terrorists. • 3 More Mails Were Sent After The Blast With The Same Misuse Of Unsecured Wifi Routers.
  • 18. submitted by :- Ramesh Sidh ITT REG NO.: BKN/2014-15/089 18 CYBER CRIMES AGAINST SOCIETY • Pornography • Cyber Trafficking • Online Gambling • Forgery
  • 19. submitted by :- Ramesh Sidh ITT REG NO.: BKN/2014-15/089 19 Phishing: Phishing Refers To The Receipt Of Unsolicited Emails By Customers Of Financial Institutions, Requesting Them To Enter Their Username, Password Or Other Personal Information To Access Their Account For Some Reason. The Fraudster Then Has Access To The Customer’s Online Bank Account And To The Funds Contained In That Account.
  • 20. submitted by :- Ramesh Sidh Itt Reg No.: Bkn/2014-15/089 20 Salami attacks: •This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. •An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed. E.G. Criminal Makes Such Program That Deducts Small Amount Like Rs. 2.50 Per Month From The Account Of All The Customer Of The Bank And Deposit The Same In His Account. In This Case No Account Holder Will Approach The Bank For Such Small Amount But Criminal Gains Huge Amount.
  • 21. submitted by :- Ramesh Sidh Itt Reg No.: Bkn/2014-15/089 21 Virus/ Worm Attacks: •They usually affect the data on a computer, either by altering or deleting it. •Worms unlike viruses do not need the host to attach themselves to. •They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory.
  • 22. submitted by :- Ramesh Sidh Itt Reg No.: Bkn/2014-15/089 22 Hacking: Unauthorized access to any computer systems or networks is known as ‘HACKING’. That is accessing the information of others without proper authorization.
  • 23. submitted by :- Ramesh Sidh Itt Reg No.: Bkn/2014-15/089 23 DENIAL OF SERVICE ATTACK This is an act by the criminal who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 24. Submitted by :- ramesh sidh ITT reg no.: Bkn/2014-15/089 24 • The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
  • 25. Submitted By :- Ramesh Sidh ITT Reg No.: Bkn/2014-15/089 25 This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Cyber stalking is a technology based attack which can take many forms, including: harassment, embarrassment and humiliation of the victim.
  • 26. Submitted By :- Ramesh Sidh ITT Reg No.: Bkn/2014-15/089 26 Trojan Attacks: This term has it’s origin in the word ‘Trojan Horse’. In software field this means an unauthorised program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail.
  • 27. CONCLUSION Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security. Submitted By :- Ramesh Sidh ITT Reg No.: Bkn/2014-15/089 27
  • 28. Submitted By :- Ramesh Sidh ITT Reg No.: Bkn/2014-15/089 28 • https://www.google.co.in • http://en.wikipedia.org • http://www.legalindia.in • http://www.e-mudhra.com • Miss sonali jain (ITT Faculty) • Self efforts
  • 29. submitted by :- Ramesh Sidh Itt Reg No.: Bkn/2014-15/089 29