SlideShare a Scribd company logo
1 of 14
CYBER CRIME
FOR EVERY LOCK,THERE IS SOMEONE OUT
THERE TRYING TO PICK IT OR BREAK IN
CONTENTS
N
INTRODUCTION
TYPES OF CYBERCRIMES
HISTORY OF CYBER
CRIMES
O
HOW TO PREVENT CYBER CRIMES
CYBER FACTS
CONCLUSION
R
CONTENTS
CONTENTS
HOW TO PREVENT CYBER CRIMES?
INTRODUCTION
Cyber crime refers to any crime that involves
computer/mobile and network.
The founding fathers of internet, don’t get that it may
be misused.
Today , there are many disturbing things happening
in cyberspace.
O
CYBER CRIMES IN INDIA
HOW TO PREVENT CYBER CRIMES
CYBER FACTS
CONCLUSION
S
R
S
A
HISTORY OF CYBERCRIMES
From the 1940s
to present,
discover how
cybercrime and
cyber security
have developed
to became what
we know today
O
CYBER CRIMES IN INDIA
HOW TO PREVENT CYBER CRIMES
CYBER FACTS
CONCLUSION
S
R
S
A
HISTORY OF CYBERCRIMES
FROM THE 1940S TO PRESENT
DISCOVER NOW CYBERCRIME AND
CYBERSECURITY HAVE DEVELOPED TO
BECAME WHAT WE KNOW TODAY.
1940 -THE TIME BEFORE CRIME
1950- THE PHONE PHREAKS
1960-ALL QUIET ON THE WESTERN
FRONT
1970- COMPUTER SECURITY OR
BORN
1980-FROM ARPANET TO INTERNET
1990- THE WORDS GOES ONLINE
2000- THREATS DIVERSITY AND
MULTIPLY 2010 THE NEXT
GENERATION
2010 -538 MILLION USERS
INFORMATION IS STOLEN FROM SINA
WEIBO
A CRIME IS DEFINED AS ANY ACT
THAT IS CONTRARY TO LEGAL CODE
OR LAWS.
THERE ARE 7 TYPES OF
CRIMES
• CRIMES AGAINST PERSONS
• CRIMES AGAINST PROPERTY
• HATE CRIMES
• CRIMES AGAINST MORALITY
• WHITE-COLLAR CRIME
• ORGANIZED CRIME
• SOCIOLOGICAL LOOK AT CRIME
TYPES OF CYBERCRIME ?
O
CYBER CRIMES IN INDIA
HOW TO PREVENT CYBER CRIMES
CYBER FACTS
CONCLUSION
S
R
S
A
HOW TO PREVENT
CYBERCRIME
PREVENTING CRIME TAKES
EACH INDIVIDUAL PERSON
BEING RESPONSIBLE FOR
THEIR OWN SAFETY AND
MAKING WISE CHOICES.
CRIME STOPPERS IS A
PROGRAM IN WHICH MEMBER
OF THE COMMUNITY, THE
MEDIA, LAW ENFORCEMENT
AGENCIES AND BUSINESSES
WORK TOGETHER TO SOLVE
CRIMES.
• HEALTHCARE ORGANIZATI
O-NS ARE THE NUMBER
ONE CYBER ATTACKED
INDUSTRY
• THERE ARE
CYBERCRIMINALS ON THE
FBI’S MOST WANTED LIST
• AS OF MAY 2016, 600,000
FACEBOOK ACCOUNTS
WERE COMPROMISED
EVERY DAY
CYBER FACTS 001
CYBER CRIME
RATE IN INDIA
BY- SUSHMITHA
AND SHALINI
O
HOW TO PREVENT CYBER CRIMES
RISK OF CYBERCRIME IS SIGNIFICANT
AND INCREASING GRADUALLY.
MUST BE CONSIDERED BY BOARDS AS
PART OF THEIR MANAGEMENT
RESPONSIBILITIES.
PROACTIVE AND PROPORTIONAL
RESPONSE ,BASED ON CYBERCRIME
RISK ASSESSMENT
CONCLUSION
BY- SUSHMITHA & SHAALINI
11-C

More Related Content

What's hot

What's hot (20)

SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
it act
it actit act
it act
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
cyber crime
cyber crimecyber crime
cyber crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Similar to Cyber crime.ppt

Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)JIEMS Akkalkuwa
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simonudhaya jeni
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.Rushabh Shah
 
6 strategies to protect yourself from cyber attack
6 strategies to protect yourself from cyber attack6 strategies to protect yourself from cyber attack
6 strategies to protect yourself from cyber attackCPA Australia
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesRoshelleBonDacara
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERARoshelleBonDacara
 

Similar to Cyber crime.ppt (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
6 strategies to protect yourself from cyber attack
6 strategies to protect yourself from cyber attack6 strategies to protect yourself from cyber attack
6 strategies to protect yourself from cyber attack
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 

More from SushmithaR26

computer networks ppt.pptx
computer networks ppt.pptxcomputer networks ppt.pptx
computer networks ppt.pptxSushmithaR26
 
PHYSICS PRACTICAL PROJECT.pptx
PHYSICS PRACTICAL PROJECT.pptxPHYSICS PRACTICAL PROJECT.pptx
PHYSICS PRACTICAL PROJECT.pptxSushmithaR26
 
CHEMISTRY PRATICAL PROJECT.pptx
CHEMISTRY PRATICAL PROJECT.pptxCHEMISTRY PRATICAL PROJECT.pptx
CHEMISTRY PRATICAL PROJECT.pptxSushmithaR26
 
Flow of execution.pptx
Flow of execution.pptxFlow of execution.pptx
Flow of execution.pptxSushmithaR26
 
Chemistry investigatory project
Chemistry investigatory projectChemistry investigatory project
Chemistry investigatory projectSushmithaR26
 

More from SushmithaR26 (6)

computer networks ppt.pptx
computer networks ppt.pptxcomputer networks ppt.pptx
computer networks ppt.pptx
 
PHYSICS PRACTICAL PROJECT.pptx
PHYSICS PRACTICAL PROJECT.pptxPHYSICS PRACTICAL PROJECT.pptx
PHYSICS PRACTICAL PROJECT.pptx
 
CHEMISTRY PRATICAL PROJECT.pptx
CHEMISTRY PRATICAL PROJECT.pptxCHEMISTRY PRATICAL PROJECT.pptx
CHEMISTRY PRATICAL PROJECT.pptx
 
Flow of execution.pptx
Flow of execution.pptxFlow of execution.pptx
Flow of execution.pptx
 
Chemistry investigatory project
Chemistry investigatory projectChemistry investigatory project
Chemistry investigatory project
 
Physics ppt
Physics pptPhysics ppt
Physics ppt
 

Recently uploaded

why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 

Recently uploaded (20)

why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 

Cyber crime.ppt

  • 1. CYBER CRIME FOR EVERY LOCK,THERE IS SOMEONE OUT THERE TRYING TO PICK IT OR BREAK IN
  • 3. O HOW TO PREVENT CYBER CRIMES CYBER FACTS CONCLUSION R CONTENTS CONTENTS HOW TO PREVENT CYBER CRIMES?
  • 4. INTRODUCTION Cyber crime refers to any crime that involves computer/mobile and network. The founding fathers of internet, don’t get that it may be misused. Today , there are many disturbing things happening in cyberspace.
  • 5. O CYBER CRIMES IN INDIA HOW TO PREVENT CYBER CRIMES CYBER FACTS CONCLUSION S R S A HISTORY OF CYBERCRIMES From the 1940s to present, discover how cybercrime and cyber security have developed to became what we know today
  • 6. O CYBER CRIMES IN INDIA HOW TO PREVENT CYBER CRIMES CYBER FACTS CONCLUSION S R S A HISTORY OF CYBERCRIMES FROM THE 1940S TO PRESENT DISCOVER NOW CYBERCRIME AND CYBERSECURITY HAVE DEVELOPED TO BECAME WHAT WE KNOW TODAY. 1940 -THE TIME BEFORE CRIME 1950- THE PHONE PHREAKS 1960-ALL QUIET ON THE WESTERN FRONT 1970- COMPUTER SECURITY OR BORN 1980-FROM ARPANET TO INTERNET 1990- THE WORDS GOES ONLINE 2000- THREATS DIVERSITY AND MULTIPLY 2010 THE NEXT GENERATION 2010 -538 MILLION USERS INFORMATION IS STOLEN FROM SINA WEIBO
  • 7. A CRIME IS DEFINED AS ANY ACT THAT IS CONTRARY TO LEGAL CODE OR LAWS. THERE ARE 7 TYPES OF CRIMES • CRIMES AGAINST PERSONS • CRIMES AGAINST PROPERTY • HATE CRIMES • CRIMES AGAINST MORALITY • WHITE-COLLAR CRIME • ORGANIZED CRIME • SOCIOLOGICAL LOOK AT CRIME TYPES OF CYBERCRIME ?
  • 8. O CYBER CRIMES IN INDIA HOW TO PREVENT CYBER CRIMES CYBER FACTS CONCLUSION S R S A HOW TO PREVENT CYBERCRIME PREVENTING CRIME TAKES EACH INDIVIDUAL PERSON BEING RESPONSIBLE FOR THEIR OWN SAFETY AND MAKING WISE CHOICES. CRIME STOPPERS IS A PROGRAM IN WHICH MEMBER OF THE COMMUNITY, THE MEDIA, LAW ENFORCEMENT AGENCIES AND BUSINESSES WORK TOGETHER TO SOLVE CRIMES.
  • 9. • HEALTHCARE ORGANIZATI O-NS ARE THE NUMBER ONE CYBER ATTACKED INDUSTRY • THERE ARE CYBERCRIMINALS ON THE FBI’S MOST WANTED LIST • AS OF MAY 2016, 600,000 FACEBOOK ACCOUNTS WERE COMPROMISED EVERY DAY CYBER FACTS 001
  • 12.
  • 13. O HOW TO PREVENT CYBER CRIMES RISK OF CYBERCRIME IS SIGNIFICANT AND INCREASING GRADUALLY. MUST BE CONSIDERED BY BOARDS AS PART OF THEIR MANAGEMENT RESPONSIBILITIES. PROACTIVE AND PROPORTIONAL RESPONSE ,BASED ON CYBERCRIME RISK ASSESSMENT CONCLUSION
  • 14. BY- SUSHMITHA & SHAALINI 11-C