SlideShare a Scribd company logo
Introduction
 How do you catch a criminal that doesn’t have a
face? A criminal that can steal $100,000 in under a
minute without even stepping foot inside the
building? That’s what law enforcement agencies
are currently trying to deal with as “cyber crimes
facing faceless thugs” – crimes committed using a
computer or the Internet – become more popular.
Categories of Cyber Crime
Individual
• cyber stalking
• distributing
pornography
• trafficking
Property
• bank details
• siphon off
money
Government
• cyber terrorism
Types of Cyber Crimes
Types of
cyber
crime
Hacking
Cyber
Stalking
Malicious
Software
Identity
Theft
Theft
Types of Criminals
Children and youngsters between
the age group of 6 – 18 years
Structured hackers
Expert hackers / crackers
Dissatisfied employees
Cyber Crimes- Indian Cases
 With increasing mobile and internet penetration in the
country, cyber crimes have also increased
proportionately. Between 2011 and 2015, more than 32000
cyber crimes were reported across the country.
 The introduction of technologies, devices including smart
phones and complex applications, and rise in usage of
cyber space for businesses has resulted in such an increase.
What is the Government Doing?
 The Ministry of Home Affairs has issued an Advisory to
the State Governments and Union Territory
Administrations on Cyber Crime.
 Government has set up cyber forensic training and
investigation labs.
 advanced training to Law Enforcement Agencies.
 The Indian Computer Emergency Response Team (CERT)
issues alerts and advisories regarding latest cyber threats
and countermeasures on regular basis.
 The cyber space is being closely monitored by the
Government .
The Vulnerabilities and Causes
USB
thumb
drives
Wireless
access
points
The
Trojan
human
Optical
media
Smart
phones
and other
digital
devices
E-mail
Ways to protect yourself from cyber crime
Use anti-
virus
software
If in doubt,
block
More than
one e-mail
accounts
Ignore pop-
ups
Macs are as
vulnerable
as PCs
Two-step
verification
Only shop
online on
secure sites
Cyber crimes
Cyber crimes
Cyber crimes

More Related Content

What's hot

Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
NEW LAW COLLEGE PUNE
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Johann Lo
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aamir Malik
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
Grant Thornton Bangladesh
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
LAW
LAWLAW
cyber crime
cyber crime cyber crime
cyber crime
christovinod
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
little robie
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistanFahad Abbasi
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
shreya sanghvi
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
Nikhil Naren
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
Sooraj Maurya
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi17
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & LawYash
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
Setu Joshi
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
vishalgohel12195
 

What's hot (20)

Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
LAW
LAWLAW
LAW
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 

Viewers also liked

Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Market segmentation
Market segmentationMarket segmentation
Market segmentation
smriti Basson
 
Business environments
Business environmentsBusiness environments
Business environments
nkosikhona ripa
 
Marketing Strategies in a Challenging Environment nimn
Marketing Strategies in a Challenging Environment   nimnMarketing Strategies in a Challenging Environment   nimn
Marketing Strategies in a Challenging Environment nimn
Luqman Olatokunbo Obileye
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Zeeshan Khan
 
Domino's pizza
Domino's pizzaDomino's pizza
Domino's pizza
Athif Azeez
 
Handicrafts
HandicraftsHandicrafts
Handicrafts
smriti Basson
 
Coworking and the Future of Work
Coworking and the Future of WorkCoworking and the Future of Work
Coworking and the Future of WorkElance-oDesk
 
Vii.a.2 Scanning Marketing Environment HHa McGraw-Hill
Vii.a.2 Scanning Marketing Environment HHa McGraw-HillVii.a.2 Scanning Marketing Environment HHa McGraw-Hill
Vii.a.2 Scanning Marketing Environment HHa McGraw-Hill
Huong Ha
 
DldTLV15
DldTLV15DldTLV15
DldTLV15
Orel Elimelech
 
Mis
MisMis
The Future of Work
The Future of WorkThe Future of Work
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types
vimal kumar arora
 
Module 2 scanning the marketing environment
Module 2 scanning the marketing environmentModule 2 scanning the marketing environment
Module 2 scanning the marketing environmentJeVaughn Ferguson
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
WTO and its ecnomic impact on pakistan
WTO and its ecnomic impact on pakistanWTO and its ecnomic impact on pakistan
WTO and its ecnomic impact on pakistan
PureLogics
 

Viewers also liked (20)

Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Market segmentation
Market segmentationMarket segmentation
Market segmentation
 
Business environments
Business environmentsBusiness environments
Business environments
 
Marketing Strategies in a Challenging Environment nimn
Marketing Strategies in a Challenging Environment   nimnMarketing Strategies in a Challenging Environment   nimn
Marketing Strategies in a Challenging Environment nimn
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Domino's pizza
Domino's pizzaDomino's pizza
Domino's pizza
 
Handicrafts
HandicraftsHandicrafts
Handicrafts
 
Coworking and the Future of Work
Coworking and the Future of WorkCoworking and the Future of Work
Coworking and the Future of Work
 
Murray slides
Murray slidesMurray slides
Murray slides
 
Vii.a.2 Scanning Marketing Environment HHa McGraw-Hill
Vii.a.2 Scanning Marketing Environment HHa McGraw-HillVii.a.2 Scanning Marketing Environment HHa McGraw-Hill
Vii.a.2 Scanning Marketing Environment HHa McGraw-Hill
 
Future of work smart working
Future of work smart workingFuture of work smart working
Future of work smart working
 
DldTLV15
DldTLV15DldTLV15
DldTLV15
 
Mc afee econ data
Mc afee econ dataMc afee econ data
Mc afee econ data
 
Mis
MisMis
Mis
 
Murray slides
Murray slidesMurray slides
Murray slides
 
The Future of Work
The Future of WorkThe Future of Work
The Future of Work
 
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types
 
Module 2 scanning the marketing environment
Module 2 scanning the marketing environmentModule 2 scanning the marketing environment
Module 2 scanning the marketing environment
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
WTO and its ecnomic impact on pakistan
WTO and its ecnomic impact on pakistanWTO and its ecnomic impact on pakistan
WTO and its ecnomic impact on pakistan
 

Similar to Cyber crimes

cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
sainnrg
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
cybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crimecybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crime
sujansujan1113
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Sibesh Singh
 
cyber crime
 cyber crime  cyber crime
cyber crime
shobhapalpari123
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
Ayub Nuri
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
Prof. Neeta Awasthy
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Pragnesh Ghoda
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Reyad Hossain
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
Manish Singh
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
Sajeel Bhatti
 

Similar to Cyber crimes (20)

Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
cybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crimecybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 

Recently uploaded

Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
AJHSSR Journal
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
SocioCosmos
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
madisonsmith478075
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
SocioCosmos
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
AJHSSR Journal
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
Digital Marketing Lab
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 

Recently uploaded (13)

Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 

Cyber crimes

  • 1.
  • 2. Introduction  How do you catch a criminal that doesn’t have a face? A criminal that can steal $100,000 in under a minute without even stepping foot inside the building? That’s what law enforcement agencies are currently trying to deal with as “cyber crimes facing faceless thugs” – crimes committed using a computer or the Internet – become more popular.
  • 3.
  • 4.
  • 5. Categories of Cyber Crime Individual • cyber stalking • distributing pornography • trafficking Property • bank details • siphon off money Government • cyber terrorism
  • 6. Types of Cyber Crimes Types of cyber crime Hacking Cyber Stalking Malicious Software Identity Theft Theft
  • 7. Types of Criminals Children and youngsters between the age group of 6 – 18 years Structured hackers Expert hackers / crackers Dissatisfied employees
  • 8. Cyber Crimes- Indian Cases  With increasing mobile and internet penetration in the country, cyber crimes have also increased proportionately. Between 2011 and 2015, more than 32000 cyber crimes were reported across the country.  The introduction of technologies, devices including smart phones and complex applications, and rise in usage of cyber space for businesses has resulted in such an increase.
  • 9.
  • 10.
  • 11. What is the Government Doing?  The Ministry of Home Affairs has issued an Advisory to the State Governments and Union Territory Administrations on Cyber Crime.  Government has set up cyber forensic training and investigation labs.  advanced training to Law Enforcement Agencies.  The Indian Computer Emergency Response Team (CERT) issues alerts and advisories regarding latest cyber threats and countermeasures on regular basis.  The cyber space is being closely monitored by the Government .
  • 12. The Vulnerabilities and Causes USB thumb drives Wireless access points The Trojan human Optical media Smart phones and other digital devices E-mail
  • 13.
  • 14. Ways to protect yourself from cyber crime Use anti- virus software If in doubt, block More than one e-mail accounts Ignore pop- ups Macs are as vulnerable as PCs Two-step verification Only shop online on secure sites