SlideShare a Scribd company logo
Presented BySiddharth Anand

ECONOMICS(H)
SECTION-A
CONTENTS
 Introduction

 History of cyber crime
 Definition
 Categories of cyber crime
 Role of computer in crime
 Cyber criminals
 Phishing
 Prevention

source-michielwillens.com
INTRODUCTION
The internet in India is growing rapidly. It has
given rise to new opportunities in every field
we can think of – be it entertainment,
business, sports or education.
There are two sides to a coin. Internet also has
its own disadvantages. One of the major

disadvantages is Cyber crime – illegal
activity committed on the internet.
HISTORY OF CYBER CRIME
 THE FIRST RECORDED CYBER CRIME IN THE 1820.

In 1820, Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom. This
device allowed the repetition of a series of steps in
the weaving of special fabrics. This resulted in a
fear amongst Jacquard's employees that their
traditional employment and livelihood were being
threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new
technology. This is the first recorded cyber crime!
DEFINING CYBER CRIME
 It’s an unlawful act wherein the computer is either

a tool or a target or both.

 Acts that are punishable by the Information

Technology Act.

 Cyber space is a virtual space that has become as

important as real space for business, politics, and
communities
CATEGORIES OF CIBER CRIME
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government.
CYBER ATTACKS STATISTICS(2013)

Source-hackmageddon.com
ROLE OF COMPUTER IN CRIME
COMPUTER AS
TARGET

Source-interaksyon.com

COMPUTER AS
TOOL
COMPUTER AS
APPLIANCE
CYBER CRIMINALS
Insider Threats

Hackers

Hactivists'

(employees)

(teenage thrill-seekers to
sophisticated criminals)

(overloads e-mail servers or hack
web sites to send political message)

Virus writers

Criminal groups

Sensitive
intrusions

(writes viruses to that infect
systems)

Information
warfare
(alternative to military attacks)

(attack systems & steal
password for financial gain)

(sensitive information is
obtained via computer
intrusions)

Terrorists

Cyber Warfare

(who have potential to disrupt
government systems with
computer attacks)

(attack by sovereigns --- Crime or
Declaration of war)
Frequently Used Cyber Crimes
 Unauthorized access to computer







systems or networks.
Theft of information contained in
electronic form.
Email bombing.
Data diddling.
Salami attacks.
Denial of Service attack.
 Virus / worm attacks
 Logic bombs

 Trojan attacks
 Internet time thefts
 Web jacking
 Theft of computer system

Source:bostinno.streetwise.co

 Physically damaging a computer

system
PHISHING
(A GROWING PROBLEM)
LINK MANIPULATION

A deception designed to steal valuable
personal data, such as credit card
numbers, passwords, account data, or
other information.

Source-pcwordl.com
GLOBAL PHISHING SURVEY 2012

Source-docs.apwg.org
EXAMPLE

WHOIS 210.104.211.21:
Location: Korea, Republic Of

Source-hongkiat.com

Images from Anti-Phishing Working Group’s Phishing Archive
Source-hongkiat.com
PEREVENTION
USE STRONG PASSWORDS
SECURE YOUR COMPUTER
1)

ACTIVATE YOUR FIREWALL

2)

USE ANTI-VIRUS

3)

BLOCK SPYWARE ATTACKS
BE SOCIAL –MEDIA SAVVY

SECURE YOUR MOBILR DEVICES.
INSTALL LATEST OS.
SECURE WIRELESS NETWORK.

PROTECT YOUR E-IDENTITY
CONCLUSION
“BYTES ARE REPLACING BULLETS IN
THE CRIME WORLD”
India needs a good combination of laws
and technology, in harmony with the
laws of other countries and keeping in
mind common security standards.
THANKYOU

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Avinash
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
Mohammed Adam
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
Cyber crime
Cyber crimeCyber crime
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Crime scenes presentation
Crime scenes presentationCrime scenes presentation
Crime scenes presentationMaria Donohue
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Nishi Agrawal
 
World Wide Web(WWW)
World Wide Web(WWW)World Wide Web(WWW)
World Wide Web(WWW)
Pratik Tambekar
 
Foedumed: World Wide Web (WWW), 43-16
Foedumed: World Wide Web (WWW), 43-16Foedumed: World Wide Web (WWW), 43-16
Foedumed: World Wide Web (WWW), 43-16
Maliha Ghazal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Introduction to the World Wide Web
Introduction to the World Wide WebIntroduction to the World Wide Web
Introduction to the World Wide WebAbdalla Mahmoud
 
Hackmageddon stats: 4 Year of Cyber Attacks
Hackmageddon stats: 4 Year of Cyber AttacksHackmageddon stats: 4 Year of Cyber Attacks
Hackmageddon stats: 4 Year of Cyber Attacks
Paolo Passeri
 
Wifi vs wimax
Wifi vs wimax Wifi vs wimax
Wifi vs wimax
jagrat123
 
Wifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter GreenWifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter GreenEngineers Australia
 
World wide web (www)
World wide web (www)World wide web (www)
World wide web (www)
Mishuk Hossan
 
DNS(Domain Name System)
DNS(Domain Name System)DNS(Domain Name System)
DNS(Domain Name System)
Vishal Mittal
 
Presentation of Crime and Punishment by Fyodor Dostoevsky
Presentation of Crime and Punishment by Fyodor Dostoevsky Presentation of Crime and Punishment by Fyodor Dostoevsky
Presentation of Crime and Punishment by Fyodor Dostoevsky
Monir Hossen
 

Viewers also liked (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Crime scenes presentation
Crime scenes presentationCrime scenes presentation
Crime scenes presentation
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
World Wide Web(WWW)
World Wide Web(WWW)World Wide Web(WWW)
World Wide Web(WWW)
 
Foedumed: World Wide Web (WWW), 43-16
Foedumed: World Wide Web (WWW), 43-16Foedumed: World Wide Web (WWW), 43-16
Foedumed: World Wide Web (WWW), 43-16
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to the World Wide Web
Introduction to the World Wide WebIntroduction to the World Wide Web
Introduction to the World Wide Web
 
Hackmageddon stats: 4 Year of Cyber Attacks
Hackmageddon stats: 4 Year of Cyber AttacksHackmageddon stats: 4 Year of Cyber Attacks
Hackmageddon stats: 4 Year of Cyber Attacks
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Wifi vs wimax
Wifi vs wimax Wifi vs wimax
Wifi vs wimax
 
Wifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter GreenWifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter Green
 
World wide web (www)
World wide web (www)World wide web (www)
World wide web (www)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
DNS(Domain Name System)
DNS(Domain Name System)DNS(Domain Name System)
DNS(Domain Name System)
 
Presentation of Crime and Punishment by Fyodor Dostoevsky
Presentation of Crime and Punishment by Fyodor Dostoevsky Presentation of Crime and Punishment by Fyodor Dostoevsky
Presentation of Crime and Punishment by Fyodor Dostoevsky
 

Similar to CYBER CRIME( DU PRESENTATION FOR FYUP)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Krishnav Ray Baruah
 
Cybercrime
CybercrimeCybercrime
Cybercrime
9410953429
 
Cyber Crime
Cyber CrimeCyber Crime
Unit 1
Unit 1Unit 1
Unit 1
Jigarthacker
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
VipinRawat52
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
SumandeepKaur733500
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correctWaheed Rana
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
CUInnovationTeam
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
RishabhJain916
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rishabh Jain
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
MuhammadAbdullah201796
 
Professional Practices PPT Slide on Chapter 5: Crime
Professional Practices PPT Slide on Chapter 5: CrimeProfessional Practices PPT Slide on Chapter 5: Crime
Professional Practices PPT Slide on Chapter 5: Crime
frazaslam10
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Karuna763604
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 

Similar to CYBER CRIME( DU PRESENTATION FOR FYUP) (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Unit 1
Unit 1Unit 1
Unit 1
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Professional Practices PPT Slide on Chapter 5: Crime
Professional Practices PPT Slide on Chapter 5: CrimeProfessional Practices PPT Slide on Chapter 5: Crime
Professional Practices PPT Slide on Chapter 5: Crime
 
English in written
English in writtenEnglish in written
English in written
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 

Recently uploaded

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 

Recently uploaded (20)

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 

CYBER CRIME( DU PRESENTATION FOR FYUP)

  • 2. CONTENTS  Introduction  History of cyber crime  Definition  Categories of cyber crime  Role of computer in crime  Cyber criminals  Phishing  Prevention source-michielwillens.com
  • 3. INTRODUCTION The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
  • 4. HISTORY OF CYBER CRIME  THE FIRST RECORDED CYBER CRIME IN THE 1820. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  • 5. DEFINING CYBER CRIME  It’s an unlawful act wherein the computer is either a tool or a target or both.  Acts that are punishable by the Information Technology Act.  Cyber space is a virtual space that has become as important as real space for business, politics, and communities
  • 6. CATEGORIES OF CIBER CRIME 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government.
  • 8. ROLE OF COMPUTER IN CRIME COMPUTER AS TARGET Source-interaksyon.com COMPUTER AS TOOL COMPUTER AS APPLIANCE
  • 9. CYBER CRIMINALS Insider Threats Hackers Hactivists' (employees) (teenage thrill-seekers to sophisticated criminals) (overloads e-mail servers or hack web sites to send political message) Virus writers Criminal groups Sensitive intrusions (writes viruses to that infect systems) Information warfare (alternative to military attacks) (attack systems & steal password for financial gain) (sensitive information is obtained via computer intrusions) Terrorists Cyber Warfare (who have potential to disrupt government systems with computer attacks) (attack by sovereigns --- Crime or Declaration of war)
  • 10. Frequently Used Cyber Crimes  Unauthorized access to computer      systems or networks. Theft of information contained in electronic form. Email bombing. Data diddling. Salami attacks. Denial of Service attack.
  • 11.  Virus / worm attacks  Logic bombs  Trojan attacks  Internet time thefts  Web jacking  Theft of computer system Source:bostinno.streetwise.co  Physically damaging a computer system
  • 12. PHISHING (A GROWING PROBLEM) LINK MANIPULATION A deception designed to steal valuable personal data, such as credit card numbers, passwords, account data, or other information. Source-pcwordl.com
  • 13. GLOBAL PHISHING SURVEY 2012 Source-docs.apwg.org
  • 14. EXAMPLE WHOIS 210.104.211.21: Location: Korea, Republic Of Source-hongkiat.com Images from Anti-Phishing Working Group’s Phishing Archive
  • 16. PEREVENTION USE STRONG PASSWORDS SECURE YOUR COMPUTER 1) ACTIVATE YOUR FIREWALL 2) USE ANTI-VIRUS 3) BLOCK SPYWARE ATTACKS
  • 17. BE SOCIAL –MEDIA SAVVY SECURE YOUR MOBILR DEVICES. INSTALL LATEST OS. SECURE WIRELESS NETWORK. PROTECT YOUR E-IDENTITY
  • 18. CONCLUSION “BYTES ARE REPLACING BULLETS IN THE CRIME WORLD” India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards.