SlideShare a Scribd company logo
CYBER CRIME:The crime which is performed through internet is called as cyber crime.
1.It not necessary in physical appearence for criminal .
2. Online transactions are spoiled by these cyber criminals.
3.Cyber crime is a major problem in the world today in a way like mugging ,stealing...... but is
different from old school times .
There are many types of cyber crimes but 5 of them are listed below as follows.
1.MALICIOUS SOFTWARE :It is an internet based programm which may leads to the deviation
of system from its normal activity .Hence in order to gain acess a software is required so that
they can find the information easily which is present in the system.
2.CHILD SOLICITING AND ABUSE:It is an another type of cyber crime in which ,where the
criminals canvass minors through the chat rooms in such a way to cause sexual exitement for the
child .Hence the FBI is disbursing much time on thisCHILD SOLICITING AND ABUSE in
order to prevent the child usually.
3.IDENTITY THEFT: It is a crucial problem over the internet especially in the areas of money
transactions and in banking.In this area of cyber crime the criminal acess the data of a person like
debit card,bank account name and number may be for the online shopping which leads to
financial problem for the victim,and also the credit history.
4.HACKING:This is a kind of crime in which the persons computer is broken and his personal or
sensitive information is being accessed.In this the persons information is being accessed with the
use of softwares where in which the system owner may not be aware from which the system is
being hacked.This is a serious issue and it is a punishable act.
5.Cyber stalking:.This is a kind of online harassement in which the victim is posed with abusive
online messages and emails.Usually these criminals know the victims and they dont use offline
instead they use Internet to do their illegal activities.If they believe that so and so person is not
responding then they start their harassement via offline to make the persons life more pathetic.
Solution
CYBER CRIME:The crime which is performed through internet is called as cyber crime.
1.It not necessary in physical appearence for criminal .
2. Online transactions are spoiled by these cyber criminals.
3.Cyber crime is a major problem in the world today in a way like mugging ,stealing...... but is
different from old school times .
There are many types of cyber crimes but 5 of them are listed below as follows.
1.MALICIOUS SOFTWARE :It is an internet based programm which may leads to the deviation
of system from its normal activity .Hence in order to gain acess a software is required so that
they can find the information easily which is present in the system.
2.CHILD SOLICITING AND ABUSE:It is an another type of cyber crime in which ,where the
criminals canvass minors through the chat rooms in such a way to cause sexual exitement for the
child .Hence the FBI is disbursing much time on thisCHILD SOLICITING AND ABUSE in
order to prevent the child usually.
3.IDENTITY THEFT: It is a crucial problem over the internet especially in the areas of money
transactions and in banking.In this area of cyber crime the criminal acess the data of a person like
debit card,bank account name and number may be for the online shopping which leads to
financial problem for the victim,and also the credit history.
4.HACKING:This is a kind of crime in which the persons computer is broken and his personal or
sensitive information is being accessed.In this the persons information is being accessed with the
use of softwares where in which the system owner may not be aware from which the system is
being hacked.This is a serious issue and it is a punishable act.
5.Cyber stalking:.This is a kind of online harassement in which the victim is posed with abusive
online messages and emails.Usually these criminals know the victims and they dont use offline
instead they use Internet to do their illegal activities.If they believe that so and so person is not
responding then they start their harassement via offline to make the persons life more pathetic.

More Related Content

Similar to CYBER CRIMEThe crime which is performed through internet is called .pdf

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
udhaya jeni
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
KajalSharma240
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
gaherwarsaloni1234
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
Sanil Shrivastava
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Rohit Revo
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
Muhammad Umar Farooq
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
Best Online Paper Writing Service
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
Muhammad Zubair
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
Aalbert Albert
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Pardeep Kumar
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 

Similar to CYBER CRIMEThe crime which is performed through internet is called .pdf (20)

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
cyber crime
cyber crimecyber crime
cyber crime
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

More from annaielectronicsvill

1) Now we consider that the product is lawnmower. Validation tests i.pdf
1) Now we consider that the product is lawnmower. Validation tests i.pdf1) Now we consider that the product is lawnmower. Validation tests i.pdf
1) Now we consider that the product is lawnmower. Validation tests i.pdf
annaielectronicsvill
 
The alcohol generally have the higher boiling poi.pdf
                     The alcohol generally have the higher boiling poi.pdf                     The alcohol generally have the higher boiling poi.pdf
The alcohol generally have the higher boiling poi.pdf
annaielectronicsvill
 
Square planar..Lone pairs will be on axial plane..pdf
                     Square planar..Lone pairs will be on axial plane..pdf                     Square planar..Lone pairs will be on axial plane..pdf
Square planar..Lone pairs will be on axial plane..pdf
annaielectronicsvill
 
For water molecule, all modes of vibrations wolud.pdf
                     For water molecule, all modes of vibrations wolud.pdf                     For water molecule, all modes of vibrations wolud.pdf
For water molecule, all modes of vibrations wolud.pdf
annaielectronicsvill
 
What do the fields of cosmology, financial matters, fund, law, scien.pdf
What do the fields of cosmology, financial matters, fund, law, scien.pdfWhat do the fields of cosmology, financial matters, fund, law, scien.pdf
What do the fields of cosmology, financial matters, fund, law, scien.pdf
annaielectronicsvill
 
e) Te S Solution e) Te.pdf
                     e) Te  S  Solution                     e) Te.pdf                     e) Te  S  Solution                     e) Te.pdf
e) Te S Solution e) Te.pdf
annaielectronicsvill
 
view sourceprint01 #includefstreamSolutionview sourceprint.pdf
view sourceprint01  #includefstreamSolutionview sourceprint.pdfview sourceprint01  #includefstreamSolutionview sourceprint.pdf
view sourceprint01 #includefstreamSolutionview sourceprint.pdf
annaielectronicsvill
 
These antibodies could be acquired by;1. Infection by measles viru.pdf
These antibodies could be acquired by;1. Infection by measles viru.pdfThese antibodies could be acquired by;1. Infection by measles viru.pdf
These antibodies could be acquired by;1. Infection by measles viru.pdf
annaielectronicsvill
 
There are many theories regarding extinction of H Neanderthals. The .pdf
There are many theories regarding extinction of H Neanderthals. The .pdfThere are many theories regarding extinction of H Neanderthals. The .pdf
There are many theories regarding extinction of H Neanderthals. The .pdf
annaielectronicsvill
 
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdfthe three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
annaielectronicsvill
 
The principle of Heliscope sequencer is based on single molecule seq.pdf
The principle of Heliscope sequencer is based on single molecule seq.pdfThe principle of Heliscope sequencer is based on single molecule seq.pdf
The principle of Heliscope sequencer is based on single molecule seq.pdf
annaielectronicsvill
 
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdfThe excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
annaielectronicsvill
 
This value belongs to PPPoE session stage protocol..PPPoE is point.pdf
This value belongs to PPPoE session stage protocol..PPPoE is point.pdfThis value belongs to PPPoE session stage protocol..PPPoE is point.pdf
This value belongs to PPPoE session stage protocol..PPPoE is point.pdf
annaielectronicsvill
 
The RASopathy diseases include-SolutionThe RASopathy diseases .pdf
The RASopathy diseases include-SolutionThe RASopathy diseases .pdfThe RASopathy diseases include-SolutionThe RASopathy diseases .pdf
The RASopathy diseases include-SolutionThe RASopathy diseases .pdf
annaielectronicsvill
 
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdfPhotosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
annaielectronicsvill
 
public class Hello {public static void main(String[] args) { P.pdf
public class Hello {public static void main(String[] args) { P.pdfpublic class Hello {public static void main(String[] args) { P.pdf
public class Hello {public static void main(String[] args) { P.pdf
annaielectronicsvill
 
Please follow the cod eand comments for description CODE #incl.pdf
Please follow the cod eand comments for description CODE #incl.pdfPlease follow the cod eand comments for description CODE #incl.pdf
Please follow the cod eand comments for description CODE #incl.pdf
annaielectronicsvill
 
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdfMolar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
annaielectronicsvill
 
Milgram experiment was conducted to demonstrate the effect that figu.pdf
Milgram experiment was conducted to demonstrate the effect that figu.pdfMilgram experiment was conducted to demonstrate the effect that figu.pdf
Milgram experiment was conducted to demonstrate the effect that figu.pdf
annaielectronicsvill
 
Infrastructure may be owned and managed by governments or by private.pdf
Infrastructure may be owned and managed by governments or by private.pdfInfrastructure may be owned and managed by governments or by private.pdf
Infrastructure may be owned and managed by governments or by private.pdf
annaielectronicsvill
 

More from annaielectronicsvill (20)

1) Now we consider that the product is lawnmower. Validation tests i.pdf
1) Now we consider that the product is lawnmower. Validation tests i.pdf1) Now we consider that the product is lawnmower. Validation tests i.pdf
1) Now we consider that the product is lawnmower. Validation tests i.pdf
 
The alcohol generally have the higher boiling poi.pdf
                     The alcohol generally have the higher boiling poi.pdf                     The alcohol generally have the higher boiling poi.pdf
The alcohol generally have the higher boiling poi.pdf
 
Square planar..Lone pairs will be on axial plane..pdf
                     Square planar..Lone pairs will be on axial plane..pdf                     Square planar..Lone pairs will be on axial plane..pdf
Square planar..Lone pairs will be on axial plane..pdf
 
For water molecule, all modes of vibrations wolud.pdf
                     For water molecule, all modes of vibrations wolud.pdf                     For water molecule, all modes of vibrations wolud.pdf
For water molecule, all modes of vibrations wolud.pdf
 
What do the fields of cosmology, financial matters, fund, law, scien.pdf
What do the fields of cosmology, financial matters, fund, law, scien.pdfWhat do the fields of cosmology, financial matters, fund, law, scien.pdf
What do the fields of cosmology, financial matters, fund, law, scien.pdf
 
e) Te S Solution e) Te.pdf
                     e) Te  S  Solution                     e) Te.pdf                     e) Te  S  Solution                     e) Te.pdf
e) Te S Solution e) Te.pdf
 
view sourceprint01 #includefstreamSolutionview sourceprint.pdf
view sourceprint01  #includefstreamSolutionview sourceprint.pdfview sourceprint01  #includefstreamSolutionview sourceprint.pdf
view sourceprint01 #includefstreamSolutionview sourceprint.pdf
 
These antibodies could be acquired by;1. Infection by measles viru.pdf
These antibodies could be acquired by;1. Infection by measles viru.pdfThese antibodies could be acquired by;1. Infection by measles viru.pdf
These antibodies could be acquired by;1. Infection by measles viru.pdf
 
There are many theories regarding extinction of H Neanderthals. The .pdf
There are many theories regarding extinction of H Neanderthals. The .pdfThere are many theories regarding extinction of H Neanderthals. The .pdf
There are many theories regarding extinction of H Neanderthals. The .pdf
 
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdfthe three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
 
The principle of Heliscope sequencer is based on single molecule seq.pdf
The principle of Heliscope sequencer is based on single molecule seq.pdfThe principle of Heliscope sequencer is based on single molecule seq.pdf
The principle of Heliscope sequencer is based on single molecule seq.pdf
 
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdfThe excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
 
This value belongs to PPPoE session stage protocol..PPPoE is point.pdf
This value belongs to PPPoE session stage protocol..PPPoE is point.pdfThis value belongs to PPPoE session stage protocol..PPPoE is point.pdf
This value belongs to PPPoE session stage protocol..PPPoE is point.pdf
 
The RASopathy diseases include-SolutionThe RASopathy diseases .pdf
The RASopathy diseases include-SolutionThe RASopathy diseases .pdfThe RASopathy diseases include-SolutionThe RASopathy diseases .pdf
The RASopathy diseases include-SolutionThe RASopathy diseases .pdf
 
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdfPhotosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
 
public class Hello {public static void main(String[] args) { P.pdf
public class Hello {public static void main(String[] args) { P.pdfpublic class Hello {public static void main(String[] args) { P.pdf
public class Hello {public static void main(String[] args) { P.pdf
 
Please follow the cod eand comments for description CODE #incl.pdf
Please follow the cod eand comments for description CODE #incl.pdfPlease follow the cod eand comments for description CODE #incl.pdf
Please follow the cod eand comments for description CODE #incl.pdf
 
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdfMolar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
 
Milgram experiment was conducted to demonstrate the effect that figu.pdf
Milgram experiment was conducted to demonstrate the effect that figu.pdfMilgram experiment was conducted to demonstrate the effect that figu.pdf
Milgram experiment was conducted to demonstrate the effect that figu.pdf
 
Infrastructure may be owned and managed by governments or by private.pdf
Infrastructure may be owned and managed by governments or by private.pdfInfrastructure may be owned and managed by governments or by private.pdf
Infrastructure may be owned and managed by governments or by private.pdf
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 

CYBER CRIMEThe crime which is performed through internet is called .pdf

  • 1. CYBER CRIME:The crime which is performed through internet is called as cyber crime. 1.It not necessary in physical appearence for criminal . 2. Online transactions are spoiled by these cyber criminals. 3.Cyber crime is a major problem in the world today in a way like mugging ,stealing...... but is different from old school times . There are many types of cyber crimes but 5 of them are listed below as follows. 1.MALICIOUS SOFTWARE :It is an internet based programm which may leads to the deviation of system from its normal activity .Hence in order to gain acess a software is required so that they can find the information easily which is present in the system. 2.CHILD SOLICITING AND ABUSE:It is an another type of cyber crime in which ,where the criminals canvass minors through the chat rooms in such a way to cause sexual exitement for the child .Hence the FBI is disbursing much time on thisCHILD SOLICITING AND ABUSE in order to prevent the child usually. 3.IDENTITY THEFT: It is a crucial problem over the internet especially in the areas of money transactions and in banking.In this area of cyber crime the criminal acess the data of a person like debit card,bank account name and number may be for the online shopping which leads to financial problem for the victim,and also the credit history. 4.HACKING:This is a kind of crime in which the persons computer is broken and his personal or sensitive information is being accessed.In this the persons information is being accessed with the use of softwares where in which the system owner may not be aware from which the system is being hacked.This is a serious issue and it is a punishable act. 5.Cyber stalking:.This is a kind of online harassement in which the victim is posed with abusive online messages and emails.Usually these criminals know the victims and they dont use offline instead they use Internet to do their illegal activities.If they believe that so and so person is not responding then they start their harassement via offline to make the persons life more pathetic. Solution CYBER CRIME:The crime which is performed through internet is called as cyber crime. 1.It not necessary in physical appearence for criminal . 2. Online transactions are spoiled by these cyber criminals. 3.Cyber crime is a major problem in the world today in a way like mugging ,stealing...... but is different from old school times . There are many types of cyber crimes but 5 of them are listed below as follows. 1.MALICIOUS SOFTWARE :It is an internet based programm which may leads to the deviation
  • 2. of system from its normal activity .Hence in order to gain acess a software is required so that they can find the information easily which is present in the system. 2.CHILD SOLICITING AND ABUSE:It is an another type of cyber crime in which ,where the criminals canvass minors through the chat rooms in such a way to cause sexual exitement for the child .Hence the FBI is disbursing much time on thisCHILD SOLICITING AND ABUSE in order to prevent the child usually. 3.IDENTITY THEFT: It is a crucial problem over the internet especially in the areas of money transactions and in banking.In this area of cyber crime the criminal acess the data of a person like debit card,bank account name and number may be for the online shopping which leads to financial problem for the victim,and also the credit history. 4.HACKING:This is a kind of crime in which the persons computer is broken and his personal or sensitive information is being accessed.In this the persons information is being accessed with the use of softwares where in which the system owner may not be aware from which the system is being hacked.This is a serious issue and it is a punishable act. 5.Cyber stalking:.This is a kind of online harassement in which the victim is posed with abusive online messages and emails.Usually these criminals know the victims and they dont use offline instead they use Internet to do their illegal activities.If they believe that so and so person is not responding then they start their harassement via offline to make the persons life more pathetic.