SlideShare a Scribd company logo
A.SIMON PRATHAP SINGH
M.Ed (Pursuing)
Department of Education
M.S University., Tirunelveli
CYBER CRIMES
• Cyber Crime as those computer mediated
activities which are either illegal or considered
illicit by certain parties and which can be
conducted through global electronic
networks.
- Thomas and Loader (2000)
Meaning
• The oxford reference online defines ‘Cyber
Crime’ as a crime committed over the
internet.
• The Britannica defines ‘Cyber Crime’ as any
crime that is committed by means of special
knowledge or expert use of computer
technology.
Common Cyber Crime
• Cracking: A person can delete files or put a
virus up or sell information or steal some
source codes and could use it for his own
benefit.
• Email Spoofing: A spoofed e-mail is one that
appears to originate from one source but
actually has been sent from another source . It
can also cause monetary damages.
TO KNOW…….
Why should we know about Cyber-Crime?
1. In this Tech-savvy world in 21st century
everyone is engaged with internet, through
whatsapp, twitter, facebook, net-banking and
lots of other platforms are there.
2. And some criminal minded persons commit
crimes here, which is included under
cybercrime.
3. So we should be aware about crimes
happening around in the cyber space.
Cyber Crimes
• Crimes are not to be measured by the issue of
events but by the bad intensions of men.
• The greatest crimes do not arise from a want
of feeling for others but from an over
sensibility for ourselves and an over
indulgence in our own.
Impacts of Cyber Crime
• Computer Crime can affect the personal records
of the individual. It can impact the financial
resources of a bank, causing confusing and
potentially affecting customer accounts.
• New technologies create new criminal
opportunities as well as new types of crime with
the modernization and availability of technology
for developmental as well as destructive purpose.
CYBER SYSTEMS
• Cyber Crime highlights the centrality of
networked computers in our lives, as well as
the fragility of such seemingly solid facts as
individual identity.
TYPES OF CYBER CRIME
i. Invision of privacy
ii. Voyeurism. It is an act done by a sexual
prevent who derives gratification from
surreptiously watching sexual acts or objects.
iii. Theft of identity.
iv. Cyber stalking: To stride with difficulty or
haughtily.
Cyber laws
• There is absolutely no comprehensive law on
cyber crime anywhere in the world. This is
reason that the investigating agencies like FBI
are finding the cyberspace to be an extremely
difficult terrain.
Examples
• Hacking
• Virus
• Spyware
• Spam
• Root kits
• Trojans
• Phishing
• Malware
THANK YOU

More Related Content

What's hot

Cyber crime
Cyber crimeCyber crime
Cyber crime
Anees Raza
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
Ahmed Sleem
 
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ratnesh Sharma
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
PELUMI APANTAKU
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Arah Louise
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
Dr.Keshav Sathaye
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
Treesa Lobo
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Computer crime
Computer crimeComputer crime
Computer crime
Surya Prasad
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
Online
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
Dr. Arun Verma
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
Dharmik Navadiya
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 

Similar to Cyber crime simon

Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain
 
Unit II.pptx
Unit II.pptxUnit II.pptx
Unit II.pptx
RamachandranPerumal5
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
sainnrg
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Rohit Revo
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
Jyotisheklingji
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
Devanshi Solanki
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
Aparajeeta Salu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
kirupasuchi1996
 

Similar to Cyber crime simon (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Unit II.pptx
Unit II.pptxUnit II.pptx
Unit II.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 

Recently uploaded

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 

Recently uploaded (20)

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 

Cyber crime simon

  • 1. A.SIMON PRATHAP SINGH M.Ed (Pursuing) Department of Education M.S University., Tirunelveli
  • 3. • Cyber Crime as those computer mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through global electronic networks. - Thomas and Loader (2000)
  • 4. Meaning • The oxford reference online defines ‘Cyber Crime’ as a crime committed over the internet. • The Britannica defines ‘Cyber Crime’ as any crime that is committed by means of special knowledge or expert use of computer technology.
  • 5. Common Cyber Crime • Cracking: A person can delete files or put a virus up or sell information or steal some source codes and could use it for his own benefit. • Email Spoofing: A spoofed e-mail is one that appears to originate from one source but actually has been sent from another source . It can also cause monetary damages.
  • 6. TO KNOW……. Why should we know about Cyber-Crime? 1. In this Tech-savvy world in 21st century everyone is engaged with internet, through whatsapp, twitter, facebook, net-banking and lots of other platforms are there. 2. And some criminal minded persons commit crimes here, which is included under cybercrime.
  • 7. 3. So we should be aware about crimes happening around in the cyber space.
  • 8. Cyber Crimes • Crimes are not to be measured by the issue of events but by the bad intensions of men. • The greatest crimes do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own.
  • 9. Impacts of Cyber Crime • Computer Crime can affect the personal records of the individual. It can impact the financial resources of a bank, causing confusing and potentially affecting customer accounts. • New technologies create new criminal opportunities as well as new types of crime with the modernization and availability of technology for developmental as well as destructive purpose.
  • 10. CYBER SYSTEMS • Cyber Crime highlights the centrality of networked computers in our lives, as well as the fragility of such seemingly solid facts as individual identity.
  • 11. TYPES OF CYBER CRIME i. Invision of privacy ii. Voyeurism. It is an act done by a sexual prevent who derives gratification from surreptiously watching sexual acts or objects. iii. Theft of identity. iv. Cyber stalking: To stride with difficulty or haughtily.
  • 12. Cyber laws • There is absolutely no comprehensive law on cyber crime anywhere in the world. This is reason that the investigating agencies like FBI are finding the cyberspace to be an extremely difficult terrain.
  • 13. Examples • Hacking • Virus • Spyware • Spam • Root kits • Trojans • Phishing • Malware