SlideShare a Scribd company logo
.
Presentation on :- Cyber Crime.
Kaushalya Kameshwar College Of
Engineering & Management, Govindpur
Dhanbad.
An iso 9001:2008 ā€“ 2015 certified organization
Submitted by :- AMIT SHANU
Submitted to :- Dr. Shweta Singh
The Asst. Professor, ( Department of communication Skills )
Computer - Oriented Crime
Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network.
The computer may have been used in the commission of a crime, or it may be the target.
Cybercrimes can be defined as: "Offences that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the reputation of the victim or cause
physical or mental harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet and mobile phones. Cybercrime may threaten a
person or a nation's security and financial health.Issues surrounding these types of crimes have
become high-profile, particularly those surrounding hacking.
2
3
Classifications of Cybercrime.
Computer crime encompasses a broad range of activities..
1. Financial fraud crimes
ā€¢ Internet fraud is a type of fraud or deception which makes use
of the Internet and could involve hiding of information or
providing incorrect information for the purpose of tricking
victims out of money, property, and inheritance.
ā€¢ According to the FBI's 2017 Internet Crime Report, the Internet
Crime Complaint Center (IC3) received about 300,000
complaints. Victims lost over $1.4 billion in online fraud in
2017. According to a study conducted by the Center for
Strategic and International Studies (CSIS) and McAfee,
cybercrime costs the global economy as much as $600 billion,
which translates into 0.8% of total global GDP.
4
Classifications of Cybercrime.
Computer crime encompasses a broad range of activities..
2. Cyberterrorism.
ā€¢ Cyberterrorism is the use of the Internet to conduct violent acts
that result in, or threaten, loss of life or significant bodily harm,
in order to achieve political or ideological gains
through threat or intimidation. It is also sometimes considered
an act of Internet terrorism where terrorist activities.
ā€¢ Government officials and information technology security
specialists have documented a significant increase in Internet
problems and server scans since early 2001. There is a growing
concern among government agencies such as the Federal
Bureau of Investigations (FBI) and the Central Intelligence
Agency(CIA) that such intrusions are part of an organized effort
by cyberterrorists.
5
Classifications of Cybercrime.
Computer crime encompasses a broad range of activities..
3. Cyber extortion.
ā€¢ Cyber extortion occurs when a website, e-mail server, or
computer system is subjected to or threatened with repeated
denial of service or other attacks by malicious hackers. These
hackers demand money in return for promising to stop the
attacks and to offer "protectionā€œ.
6
4. Cyber warfare.
ā€¢ Cyberwarfare is the use of technology to attack a nation,
causing comparable harm to actual warfare.ā€˜Cyberwarfareā€™
does not imply scale, protraction or violence which are typically
associated with the term ā€˜warā€™.There is significant debate
among experts regarding the definition of cyberwarfare, and
even if such a thing exists.
Classifications of Cybercrime.
Computer crime encompasses a broad range of activities..
5. Computer as a target.
ā€¢ These crimes are committed by a selected group of criminals.
Unlike crimes using the computer as a tool, these crimes
require the technical knowledge of the perpetrators. As such,
as technology evolves, so too does the nature of the crime.
These crimes are relatively new, having been in existence for
only as long as computers haveā€”which explains how
unprepared society and the world, in general, is towards
combating these crimes. There are numerous crimes of this
nature committed daily on the internet. It is seldom committed
by loners, instead it involves large syndicate groups.
ā€¢ Crimes that primarily target computer networks or devices
include:
ā€¢ Computer viruses
ā€¢ Denial-of-service attacks
ā€¢ Malware (malicious code) 7
Classifications of Cybercrime.
Computer crime encompasses a broad range of activities..
6. Drug trafficking.
ā€¢ Darknet markets are used to buy and sell recreational
drugs online. Some drug traffickers use encrypted messaging
tools to communicate with drug mules. The dark web site Silk
Road was a major online marketplace for drugs before it was
shut down by law enforcement (then reopened under new
management, and then shut down by law enforcement again).
After Silk Road 2.0 went down, Silk Road 3 Reloaded emerged.
However, it was just an older marketplace named Diabolus
Market, that used the name for more exposure from the
brand's previous success.
8
Some Documented cases.
ā€¢ One of the highest profiled banking computer crime occurred
during a course of three years beginning in 1970. The chief
teller at the Park Avenue branch of New York's Union Dime
Savings Bank embezzled over $1.5 million from hundreds of
accounts.
ā€¢ A hacking group called MOD (Masters of Deception), allegedly
stole passwords and technical data from Pacific Bell, Nynex, and
other telephone companies as well as several big credit
agencies and two major universities. The damage caused was
extensive, one company, Southwestern Bell suffered losses of
$370,000.
ā€¢ In 1983, a 19-year-old UCLA student used his PC to break into a
Defense Department International Communications system.
ā€¢ In June 2012 LinkedIn and eHarmony were attacked,
compromising 65 million password hashes. 30,000 passwords
were cracked and 1.5 million EHarmony passwords were posted
online.
9
A report (sponsored by McAfee), published in 2014, estimated that the annual damage to the global economy was $445
billion. Approximately $1.5 billion was lost in 2012 to online credit and debit card fraud in the US.In 2018, a study by Center
for Strategic and International Studies (CSIS), in partnership with McAfee, concludes that close to $600 billion, nearly one
percent of global GDP, is lost to cybercrime each year.
The government doing to counter cybercrime.
10
ā€¢ Countering cybercrime is a daunting challenge, not only because there
are so many cybercriminals but also because they are so technically
sophisticated.
ā€¢ CYBERPOL The International Cyber Policing Organization Public
Utility was established in Belgium by Royal Decree WL22/16.595
together with 136 Countries on the 22 July 2015. The first
International Cyber Policing Summit took place on the 17 and 18
November 2015 attended by 110 officials and 8 ambassadors at the
Palais Des Congres te Brussels. CYBERPOL predicted Cyber Crime will
cost the global economy $1.2 Trillion by the end of 2019.
Computer security, cybersecurity or information
technology security (IT security).
ā€¢ Computer security, cybersecurity or information technology
security (IT security) is the protection of computer systems from the
theft of or damage to their hardware, software, or electronic data,
as well as from the disruption or misdirection of the services they
provide.
ā€¢ The field is becoming more important due to increased reliance on
computer systems, the Internet and wireless network standards
such as Bluetooth and Wi-Fi, and due to the growth of "smart"
devices, including smartphones, televisions, and the various devices
that constitute the "Internet of things". Owing to its complexity,
both in terms of politics and technology, cybersecurity is also one of
the major challenges in the contemporary world.
11
12
Thankyouguysforsupportingand
Amit Shanu
7903856634
amitshanu810@gmail.com
www.facebook.com/amitshanu810
understanding me..!!
"Cyber crime", or computer-oriented crime..!!

More Related Content

What's hot

Ppt
PptPpt
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
Aditya Singh
Ā 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
Ā 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
Ā 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
Ā 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
Ā 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
Ā 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
Ā 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
Arindam Sarkar
Ā 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
Ā 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
Dr Raghu Khimani
Ā 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
Mary Rayme
Ā 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYSahil Vashishtha
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aashir Khalil
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
rishith23
Ā 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliAhtasham Ali
Ā 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
Ā 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Shivam Lohiya
Ā 
cyber crime
cyber crimecyber crime
cyber crime
Nauman Ali
Ā 

What's hot (20)

Ppt
PptPpt
Ppt
Ā 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
Ā 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Ā 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Ā 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
Ā 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Ā 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Ā 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Ā 
cyber crime
cyber crimecyber crime
cyber crime
Ā 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
Ā 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ā 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
Ā 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
Ā 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ā 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
Ā 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Ā 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Ā 
cyber crime
cyber crimecyber crime
cyber crime
Ā 

Similar to "Cyber crime", or computer-oriented crime..!!

A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
Jody Sullivan
Ā 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
ijbuiiir1
Ā 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Prachi ranpura
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
Ā 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
Ā 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
Ā 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
assanesignate
Ā 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
Ā 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
Ā 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorismDharani Adusumalli
Ā 
cyber crime
 cyber crime  cyber crime
cyber crime
shobhapalpari123
Ā 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Rohit Revo
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
praveen1792
Ā 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
MehediHasan996
Ā 
Cyber security
Cyber securityCyber security
Cyber security
TonyYeung23
Ā 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
Christina Bauer
Ā 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Buy A Paper Gallatin
Ā 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
ijcisjournal
Ā 

Similar to "Cyber crime", or computer-oriented crime..!! (20)

A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
Ā 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
Ā 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Ā 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ā 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ā 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
Ā 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
Ā 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Ā 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Ā 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
Ā 
cyber crime
 cyber crime  cyber crime
cyber crime
Ā 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ā 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Ā 
Cyber security
Cyber securityCyber security
Cyber security
Ā 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
Ā 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Ā 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
Ā 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
Ā 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
Ā 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
Ā 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
Ā 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
Ā 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
Ā 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
Ā 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
Ā 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
Ā 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
Ā 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
Ā 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
Ā 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
Ā 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
Ā 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
Ā 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
Ā 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
Ā 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
Ā 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
Ā 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
Ā 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Ā 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Ā 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Ā 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Ā 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
Ā 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
Ā 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Ā 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Ā 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Ā 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
Ā 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Ā 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
Ā 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
Ā 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Ā 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
Ā 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Ā 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Ā 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Ā 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
Ā 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
Ā 

"Cyber crime", or computer-oriented crime..!!

  • 1. . Presentation on :- Cyber Crime. Kaushalya Kameshwar College Of Engineering & Management, Govindpur Dhanbad. An iso 9001:2008 ā€“ 2015 certified organization Submitted by :- AMIT SHANU Submitted to :- Dr. Shweta Singh The Asst. Professor, ( Department of communication Skills )
  • 2. Computer - Oriented Crime Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet and mobile phones. Cybercrime may threaten a person or a nation's security and financial health.Issues surrounding these types of crimes have become high-profile, particularly those surrounding hacking. 2
  • 3. 3
  • 4. Classifications of Cybercrime. Computer crime encompasses a broad range of activities.. 1. Financial fraud crimes ā€¢ Internet fraud is a type of fraud or deception which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance. ā€¢ According to the FBI's 2017 Internet Crime Report, the Internet Crime Complaint Center (IC3) received about 300,000 complaints. Victims lost over $1.4 billion in online fraud in 2017. According to a study conducted by the Center for Strategic and International Studies (CSIS) and McAfee, cybercrime costs the global economy as much as $600 billion, which translates into 0.8% of total global GDP. 4
  • 5. Classifications of Cybercrime. Computer crime encompasses a broad range of activities.. 2. Cyberterrorism. ā€¢ Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. It is also sometimes considered an act of Internet terrorism where terrorist activities. ā€¢ Government officials and information technology security specialists have documented a significant increase in Internet problems and server scans since early 2001. There is a growing concern among government agencies such as the Federal Bureau of Investigations (FBI) and the Central Intelligence Agency(CIA) that such intrusions are part of an organized effort by cyberterrorists. 5
  • 6. Classifications of Cybercrime. Computer crime encompasses a broad range of activities.. 3. Cyber extortion. ā€¢ Cyber extortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers. These hackers demand money in return for promising to stop the attacks and to offer "protectionā€œ. 6 4. Cyber warfare. ā€¢ Cyberwarfare is the use of technology to attack a nation, causing comparable harm to actual warfare.ā€˜Cyberwarfareā€™ does not imply scale, protraction or violence which are typically associated with the term ā€˜warā€™.There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists.
  • 7. Classifications of Cybercrime. Computer crime encompasses a broad range of activities.. 5. Computer as a target. ā€¢ These crimes are committed by a selected group of criminals. Unlike crimes using the computer as a tool, these crimes require the technical knowledge of the perpetrators. As such, as technology evolves, so too does the nature of the crime. These crimes are relatively new, having been in existence for only as long as computers haveā€”which explains how unprepared society and the world, in general, is towards combating these crimes. There are numerous crimes of this nature committed daily on the internet. It is seldom committed by loners, instead it involves large syndicate groups. ā€¢ Crimes that primarily target computer networks or devices include: ā€¢ Computer viruses ā€¢ Denial-of-service attacks ā€¢ Malware (malicious code) 7
  • 8. Classifications of Cybercrime. Computer crime encompasses a broad range of activities.. 6. Drug trafficking. ā€¢ Darknet markets are used to buy and sell recreational drugs online. Some drug traffickers use encrypted messaging tools to communicate with drug mules. The dark web site Silk Road was a major online marketplace for drugs before it was shut down by law enforcement (then reopened under new management, and then shut down by law enforcement again). After Silk Road 2.0 went down, Silk Road 3 Reloaded emerged. However, it was just an older marketplace named Diabolus Market, that used the name for more exposure from the brand's previous success. 8
  • 9. Some Documented cases. ā€¢ One of the highest profiled banking computer crime occurred during a course of three years beginning in 1970. The chief teller at the Park Avenue branch of New York's Union Dime Savings Bank embezzled over $1.5 million from hundreds of accounts. ā€¢ A hacking group called MOD (Masters of Deception), allegedly stole passwords and technical data from Pacific Bell, Nynex, and other telephone companies as well as several big credit agencies and two major universities. The damage caused was extensive, one company, Southwestern Bell suffered losses of $370,000. ā€¢ In 1983, a 19-year-old UCLA student used his PC to break into a Defense Department International Communications system. ā€¢ In June 2012 LinkedIn and eHarmony were attacked, compromising 65 million password hashes. 30,000 passwords were cracked and 1.5 million EHarmony passwords were posted online. 9 A report (sponsored by McAfee), published in 2014, estimated that the annual damage to the global economy was $445 billion. Approximately $1.5 billion was lost in 2012 to online credit and debit card fraud in the US.In 2018, a study by Center for Strategic and International Studies (CSIS), in partnership with McAfee, concludes that close to $600 billion, nearly one percent of global GDP, is lost to cybercrime each year.
  • 10. The government doing to counter cybercrime. 10 ā€¢ Countering cybercrime is a daunting challenge, not only because there are so many cybercriminals but also because they are so technically sophisticated. ā€¢ CYBERPOL The International Cyber Policing Organization Public Utility was established in Belgium by Royal Decree WL22/16.595 together with 136 Countries on the 22 July 2015. The first International Cyber Policing Summit took place on the 17 and 18 November 2015 attended by 110 officials and 8 ambassadors at the Palais Des Congres te Brussels. CYBERPOL predicted Cyber Crime will cost the global economy $1.2 Trillion by the end of 2019.
  • 11. Computer security, cybersecurity or information technology security (IT security). ā€¢ Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. ā€¢ The field is becoming more important due to increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world. 11
  • 12. 12