SlideShare a Scribd company logo
IN THE NAME OF ALLAH THE MOST
GRACIOUS,THE MOST MERCEFUL
Crime, Computer Crime and Cyber Crime
By
Israr Ahmad
MS(CS) KUST
15th April 2023
What is Crime?
 An action or omission which constitute an offence and is
punishable by law.
 Violation of the law.
 Different types of crimes in common society.
.Like Murder, Theft, Robbery and Computer Crime etc.
What is Computer Crime?
 Computer crime refers to any crime that involves a computer
and a network.
 The computer may have been used in the commission of a
crime. Like illegal imports, Malicious programs.
 Cybercrimes are defined as .”Offences that are committed
against individuals or group of individuals with a criminal
motive to intentionally harm the victim physically or mentally
through direct or indirect source using modern
telecommunication networks such as internet and mobile
phones.
Cyber Crime
 Introduction
 Cyber threat evolution.
 Categories of cyber crime.
 Types of Cyber crime.
 Prevention.
 Security.
Introduction
 The internet in the world is growing rapidly. It has
given rise to new opportunities in every field.
Entertainment, Business, sports or education.
 There are two sides of a coin. Internet also has it’s own
disadvantages is Cyber crime. Illegal activities
committed on the internet.
Cyber threat Evolution
Categorization of cyber crime
• The computer as a target.
• The Computer as a weapon.
Types of Cyber Crime
 Hacking
 Denial of service attack
 Virus dissemination
 Computer Vandalism
 Cyber Terrorism
 Software Piracy
Hacking
Denial of service attack(DoS)
 Act by the criminal, who floods the bandwidth of the
victims network.
 Type of cybercrime in which made site unavailable ,by
multiple computer requests that prevent it from
responding to request from legitimate users.
Virus dissemination
 Malicious software that attaches itself to other
software.(which can be a virus, worms, trojan horse
etc) which has the ability to destroy the victim
computer/system.
Computer vandalism
 Demanding or destroying data rather than
stealing .
 Transmitting Virus
 Hacker Power
Cyber Terrorism
 Use of internet based attacks
in the terrorist activities.
Software Privacy
 Theft of software through the illegal coping of
genuine programs.
 Distribution of products intended to pass for
the original.
Prevention
 Use antivirus software’s.
 Insert firewalls.
 Uninstall unnecessary software.
 Maintain backup.
 Check security settings.
 Never share your information with strangers.
 Update yourself about internet security.
Security/Cyber Security
 Internet security ia a branch of computer security
specifically related to the internet.
 It’s objective is to establish rules and measure to use
against attacks over the internet.
 Internet Security defend us from critical attacks.
Browse the safe websites, Process all the incoming and
outgoing data on our computer.
THANK YOU FOR LISTENING

More Related Content

Similar to Cyber crime.pptx

Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
VipinRawat52
 
Cyber security
Cyber securityCyber security
Cyber security
Komal Samdariya
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 
cyber crime
cyber crime cyber crime
cyber crime
Midhun Suresh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rishabh Jain
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
RishabhJain916
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
sunanditaAnand
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
c_s_halabja
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
awderdlfy
 
Computer crime
Computer crimeComputer crime
Computer crime
Vishesh Dalal
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Ivy Rose Recierdo
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
Avinash Katariya
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 

Similar to Cyber crime.pptx (20)

Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 

Recently uploaded

一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
ywqeos
 
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
aguty
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
hyfjgavov
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
lzdvtmy8
 
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
slg6lamcq
 
Cell The Unit of Life for NEET Multiple Choice Questions.docx
Cell The Unit of Life for NEET Multiple Choice Questions.docxCell The Unit of Life for NEET Multiple Choice Questions.docx
Cell The Unit of Life for NEET Multiple Choice Questions.docx
vasanthatpuram
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
exukyp
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
oaxefes
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
taqyea
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理 原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
tzu5xla
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
bmucuha
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
ytypuem
 

Recently uploaded (20)

一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
 
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
 
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
 
Cell The Unit of Life for NEET Multiple Choice Questions.docx
Cell The Unit of Life for NEET Multiple Choice Questions.docxCell The Unit of Life for NEET Multiple Choice Questions.docx
Cell The Unit of Life for NEET Multiple Choice Questions.docx
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理 原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
 

Cyber crime.pptx

  • 1. IN THE NAME OF ALLAH THE MOST GRACIOUS,THE MOST MERCEFUL
  • 2. Crime, Computer Crime and Cyber Crime By Israr Ahmad MS(CS) KUST 15th April 2023
  • 3. What is Crime?  An action or omission which constitute an offence and is punishable by law.  Violation of the law.  Different types of crimes in common society. .Like Murder, Theft, Robbery and Computer Crime etc.
  • 4. What is Computer Crime?  Computer crime refers to any crime that involves a computer and a network.  The computer may have been used in the commission of a crime. Like illegal imports, Malicious programs.  Cybercrimes are defined as .”Offences that are committed against individuals or group of individuals with a criminal motive to intentionally harm the victim physically or mentally through direct or indirect source using modern telecommunication networks such as internet and mobile phones.
  • 5. Cyber Crime  Introduction  Cyber threat evolution.  Categories of cyber crime.  Types of Cyber crime.  Prevention.  Security.
  • 6. Introduction  The internet in the world is growing rapidly. It has given rise to new opportunities in every field. Entertainment, Business, sports or education.  There are two sides of a coin. Internet also has it’s own disadvantages is Cyber crime. Illegal activities committed on the internet.
  • 8. Categorization of cyber crime • The computer as a target. • The Computer as a weapon.
  • 9. Types of Cyber Crime  Hacking  Denial of service attack  Virus dissemination  Computer Vandalism  Cyber Terrorism  Software Piracy
  • 11. Denial of service attack(DoS)  Act by the criminal, who floods the bandwidth of the victims network.  Type of cybercrime in which made site unavailable ,by multiple computer requests that prevent it from responding to request from legitimate users.
  • 12. Virus dissemination  Malicious software that attaches itself to other software.(which can be a virus, worms, trojan horse etc) which has the ability to destroy the victim computer/system.
  • 13. Computer vandalism  Demanding or destroying data rather than stealing .  Transmitting Virus  Hacker Power
  • 14. Cyber Terrorism  Use of internet based attacks in the terrorist activities.
  • 15. Software Privacy  Theft of software through the illegal coping of genuine programs.  Distribution of products intended to pass for the original.
  • 16. Prevention  Use antivirus software’s.  Insert firewalls.  Uninstall unnecessary software.  Maintain backup.  Check security settings.  Never share your information with strangers.  Update yourself about internet security.
  • 17. Security/Cyber Security  Internet security ia a branch of computer security specifically related to the internet.  It’s objective is to establish rules and measure to use against attacks over the internet.  Internet Security defend us from critical attacks. Browse the safe websites, Process all the incoming and outgoing data on our computer.
  • 18. THANK YOU FOR LISTENING