SlideShare a Scribd company logo
1 of 9
Presented By :
Md Muktadir Rahman
TOPIC:
CYBER OFFENCES
.
WHAT IS CYBER OFFENCES ?
Cyber Offences, also called computer crime, is any
illicit activity that involves a computer or network-
connected device, such as a mobile phone. The
Department of Justice divides cybercrime into 3
section:
1. Crimes in which the computing device is the target,
2. Crimes in which the computer is used as a weapon,
3. Crimes in which the computer is used as an
accessory to a crime.
HOW CYBER OFFENCES WORKS?
Most cyber crimes are committed by individuals or small groups. However,
large organized crime groups also take advantage of the Internet. These
"professional" criminals find new ways to commit old crimes, treating cyber
crime like a business and forming global criminal communities.
Criminal communities share strategies and tools and can combine forces to
launch coordinated attacks. They even have an underground marketplace
where cyber criminals can buy and sell stolen information and identities.
STEP OF CYBER OFFENCES
Cyber offences are the illegitimate actions, which are carried out in a
classy manner where either the computer is the tool or target or both.
Cyber-crime usually includes the following βˆ’
Unauthorized access of the computers Logic bombs
Data diddling Trojan attacks
Virus/worms attack Internet time theft
Theft of computer system Web jacking
Hacking Email bombing
Denial of attacks Salami attacks
DIFFERENT TYPE OF CYBER
OFFENCES
1. Cybercrime threatens national security of
country.
2. Cybercrimes has lots of harmful effects. Due to
this common people suffers a lot in various way –
Technically , Economically etc.
3. Cyber terrorism increases.
4. Wastage of valuable time.
5. Loss of revenue.
6. Damaged reputations.
7. Reproduced productivity.
EFFECT OF CYBER OFFENCE
RANGE OF CYBER OFFENCES
EFFECT
Advantages:
1. It helps automate various tasks that cannot be done manually.
2. It helps organize data and information in a better way and it has much more
computing and calculating power than human.
3. It may be the storage of important data and files.
Disadvantages:
1. It may damage your studies and social life.
2. The way it distracts can deviate our thoughts and activities towards
unproductive activities.
3. It could cause violation of privacy.
ADVANTAGES AND DISADVANTAGES:
Cyber Security

More Related Content

What's hot

cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
Β 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
Β 
Cyber crime
Cyber crimeCyber crime
Cyber crimeTeja Babu
Β 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismYanis Mendez
Β 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
Β 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
Β 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
Β 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
Β 
Cyber security
Cyber securityCyber security
Cyber securityTanmoyMaitra
Β 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysiscodefortomorrow
Β 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
Β 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansMaurice Dawson
Β 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
Β 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORDharmik Navadiya
Β 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismYanis Mendez
Β 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
Β 
cyber crime
cyber crimecyber crime
cyber crimeMukund10
Β 
Cyber space & critical information infrastructure
Cyber space & critical information infrastructureCyber space & critical information infrastructure
Cyber space & critical information infrastructureNarayan Joshi
Β 

What's hot (20)

pravallika chowdary
pravallika chowdarypravallika chowdary
pravallika chowdary
Β 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
Β 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Β 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Β 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Β 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Β 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
Β 
Cyberspace
CyberspaceCyberspace
Cyberspace
Β 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
Β 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
Β 
Cyber security
Cyber securityCyber security
Cyber security
Β 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
Β 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Β 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
Β 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Β 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
Β 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Β 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
Β 
cyber crime
cyber crimecyber crime
cyber crime
Β 
Cyber space & critical information infrastructure
Cyber space & critical information infrastructureCyber space & critical information infrastructure
Cyber space & critical information infrastructure
Β 

Similar to Cyber Security

Cyber crime
Cyber crimeCyber crime
Cyber crimeRajat Jain
Β 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesVivekanandaGN1
Β 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
Β 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
Β 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.pptTanviModi14
Β 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
Β 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
Β 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
Β 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
Β 
Computer Crime
Computer CrimeComputer Crime
Computer CrimeFarjana Akter
Β 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
Β 
Cybersecurity
CybersecurityCybersecurity
CybersecurityDiegoMtzS
Β 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
Β 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
Β 

Similar to Cyber Security (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
Β 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
Β 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Β 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Β 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
Β 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
Β 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
Β 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Β 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
Β 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
Β 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
Β 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
Β 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Β 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
Β 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Β 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
Β 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Β 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Β 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Β 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Β 

More from Muktadir Shoaib

More from Muktadir Shoaib (15)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
Β 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Β 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Β 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Β 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Β 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Β 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Β 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Β 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Β 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Β 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Β 
Vendingmachine
VendingmachineVendingmachine
Vendingmachine
Β 
Project presentation
Project presentation Project presentation
Project presentation
Β 
introduction to c
introduction to cintroduction to c
introduction to c
Β 
Lecture 1-introduction to c
Lecture 1-introduction to cLecture 1-introduction to c
Lecture 1-introduction to c
Β 

Recently uploaded

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Β 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
Β 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
Β 
Russian Call Girls in Kolkata Samaira 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🀌  8250192130 πŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🀌  8250192130 πŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🀌 8250192130 πŸš€ Vip Call Girls Kolkataanamikaraghav4
Β 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
Β 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
Β 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Β 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
Β 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
Β 
Call Girls In Defence Colony Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Defence Colony Delhi πŸ’―Call Us πŸ”8264348440πŸ”Call Girls In Defence Colony Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Defence Colony Delhi πŸ’―Call Us πŸ”8264348440πŸ”soniya singh
Β 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
Β 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
Β 
Call Girls In Ashram Chowk Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Ashram Chowk Delhi πŸ’―Call Us πŸ”8264348440πŸ”Call Girls In Ashram Chowk Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Ashram Chowk Delhi πŸ’―Call Us πŸ”8264348440πŸ”soniya singh
Β 
Low Rate Call Girls Kolkata Avani 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🀌  8250192130 πŸš€ Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🀌  8250192130 πŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🀌 8250192130 πŸš€ Vip Call Girls Kolkataanamikaraghav4
Β 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
Β 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
Β 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
Β 
VIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130 Available With Roomishabajaj13
Β 

Recently uploaded (20)

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
Β 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Β 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
Β 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Β 
Russian Call Girls in Kolkata Samaira 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🀌  8250192130 πŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🀌  8250192130 πŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Β 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
Β 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
Β 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
Β 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
Β 
Model Call Girl in Jamuna Vihar Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in  Jamuna Vihar Delhi reach out to us at πŸ”9953056974πŸ”Model Call Girl in  Jamuna Vihar Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Jamuna Vihar Delhi reach out to us at πŸ”9953056974πŸ”
Β 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Β 
Call Girls In Defence Colony Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Defence Colony Delhi πŸ’―Call Us πŸ”8264348440πŸ”Call Girls In Defence Colony Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Defence Colony Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Β 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Β 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
Β 
Call Girls In Ashram Chowk Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Ashram Chowk Delhi πŸ’―Call Us πŸ”8264348440πŸ”Call Girls In Ashram Chowk Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Ashram Chowk Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Β 
Low Rate Call Girls Kolkata Avani 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🀌  8250192130 πŸš€ Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🀌  8250192130 πŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Β 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Β 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Β 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
Β 
VIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130 Available With Room
Β 

Cyber Security

  • 1. Presented By : Md Muktadir Rahman TOPIC: CYBER OFFENCES
  • 2. . WHAT IS CYBER OFFENCES ? Cyber Offences, also called computer crime, is any illicit activity that involves a computer or network- connected device, such as a mobile phone. The Department of Justice divides cybercrime into 3 section: 1. Crimes in which the computing device is the target, 2. Crimes in which the computer is used as a weapon, 3. Crimes in which the computer is used as an accessory to a crime.
  • 3. HOW CYBER OFFENCES WORKS? Most cyber crimes are committed by individuals or small groups. However, large organized crime groups also take advantage of the Internet. These "professional" criminals find new ways to commit old crimes, treating cyber crime like a business and forming global criminal communities. Criminal communities share strategies and tools and can combine forces to launch coordinated attacks. They even have an underground marketplace where cyber criminals can buy and sell stolen information and identities.
  • 4. STEP OF CYBER OFFENCES
  • 5. Cyber offences are the illegitimate actions, which are carried out in a classy manner where either the computer is the tool or target or both. Cyber-crime usually includes the following βˆ’ Unauthorized access of the computers Logic bombs Data diddling Trojan attacks Virus/worms attack Internet time theft Theft of computer system Web jacking Hacking Email bombing Denial of attacks Salami attacks DIFFERENT TYPE OF CYBER OFFENCES
  • 6. 1. Cybercrime threatens national security of country. 2. Cybercrimes has lots of harmful effects. Due to this common people suffers a lot in various way – Technically , Economically etc. 3. Cyber terrorism increases. 4. Wastage of valuable time. 5. Loss of revenue. 6. Damaged reputations. 7. Reproduced productivity. EFFECT OF CYBER OFFENCE
  • 7. RANGE OF CYBER OFFENCES EFFECT
  • 8. Advantages: 1. It helps automate various tasks that cannot be done manually. 2. It helps organize data and information in a better way and it has much more computing and calculating power than human. 3. It may be the storage of important data and files. Disadvantages: 1. It may damage your studies and social life. 2. The way it distracts can deviate our thoughts and activities towards unproductive activities. 3. It could cause violation of privacy. ADVANTAGES AND DISADVANTAGES: