SlideShare a Scribd company logo
1 of 14
Download to read offline
CYBER
CRIME
Presented by :
Isha Saklani & Kirti Goyal
Awareness on Cyber Crime
Agenda What is cyber crime?
Why it has increased in recent years?
Terrifying stats of cybercrimes
Worldwide impact of cybercrime
How to report against cybercime
How to protect against cyber crime
Cyber crime is criminal activity that either targets or
uses a computer, a computer network or a networked
device. Most cyber crime is committed by cyber
criminals or hackers who want to make money.
What is Cyber
Crime ?
Why it has increased
in recent years?
Increased levels of connectivity, remote working, reliance on technology, and automation
have increased the frequency of cyber crimeAlso,
Also, Cybercriminals have used the coronavirus pandemic for their crime Lat year when the
whole world took to the online medium due to coronavirus pandemic the frequency of
cybercrime increased.
Cyber crime are developing and boosting their attacks at an alarming pace, exploiting the
fear and uncertainty caused by the unstable social and economic situations created by
COVID 19
Terryfying stats of Cybercrime
The cost of cybercrime is predicted to hit $8 trillion in 2023 and will grow to $10.5 trillion by
2025, according Cybersecurity Ventures' "2022 Official Cybercrime Report,"
In India, the number of cyber-related crimes reported in 2018 was 208,456. In the first 2 months
of 2022 alone, there were a reported 212,485 cyber crimes, more than the entirety of 2018.
The figures rose more sharply through the pandemic, with reported crime jumping from 394,499
cases in 2019 to 1,158,208 in 2020 and 1,402,809 in 2021.
Between Q1 and Q2 2022, cyber crime across India increased by 15.3%.
An average of 97 cybercrime victims per hour which means 2328 per day and 33 billion
accounts will be breached in 2023
At 16% phishing was the second most common reason for data breaches and
$6 trillion – the damage that cybercrime caused in 2022.
Cybercrime has claimed at least 6.5 million victims over a 21-year period from
the costliest averaging $ 4.91 million in breach costs.
2001 to 2021 with an estimated loss of nearly $26 billion over the same period.
Top 20 countries impacted by cyber crimes
MALWARE ATTACKS
Any type of malicious
software designed to
harmor exploit any device,
service or network.
SPAMMING AND
PHISHING
Spam is unsolicited email,
instant messages, social
media messages.
Phishing is an email sent
from an internet criminal
as an email from a
legitimate source.
IDENTITY THEFT
crime of obtaining the
personal or financial
information of another
person to use their identity
to commit fraud.
DISTRIBUTED DOS
ATTACKS
are a type of cybercrime
attack that cybercriminals
use to bring down a system
or network.
Categories of Cyber Crime
CYBER SPYING
It typically involves the use
of such access to secrets
and classified information
or control of individual
computers
CYBER BULLYING
It is bullying with the use of
digital technologies. It can
take place on social
media, messaging
platforms, gaming
platforms and mobile
phones.
CYBERTERRORISM
is often defined as any
premeditated, politically
motivated attack against
information systems,
programs and data that
threatens violence or
results in violence.
SECURITY HACKER
It is someone who
explores methods for
breaching defenses and
exploiting weaknesses in a
computer system or
network.
Categories of Cyber Crime
HOW TO
REPORT
CYBER
CRIME IN
INDIA!
One can reach out to the National Cyber Crime
Reporting portal (Helpline no. - 1930) to register
any complaint about cyber crime, including cyber
fraud.
One can also contact the nearest police station to
file your complaint.
You can also file your complaint to
cybercrime.gov.in
1. Keep software and operating system updated
Keeping your software and operating system up to date ensures that you benefit from the latest
security patches to protect your computer.
2. Use strong passwords
Be sure to use strong passwords that people will not guess and do not record them anywhere or
use a reputable password manager to generate strong passwords randomly to make this easier.
3. Never open attachments in spam emails
A classic way that computers get infected by malware attacks and other forms of cybercrime is via
email attachments in spam emails. Never open an attachment from a sender you do not know.
4. Do not click on links in spam emails or untrusted websites
Another way people become victims of cybercrime is by clicking on links in spam emails or other
messages, or unfamiliar websites. Avoid doing this to stay safe online.
5. Do not give out personal information unless secure
Never give out personal data over the phone or via email unless you are completely sure the line or
email is secure. Make certain that you are speaking to the person you think you are.
6. Keep an eye on your bank statements
Spotting that you have become a victim of cybercrime quickly is important. Keep an eye on your
bank statements and query any unfamiliar transactions with the bank. The bank can investigate
whether they are fraudulent.
7. Be mindful of which website URLs you visit
Keep an eye on the URLs you are clicking on. Do they look legitimate? Avoid clicking on links with
unfamiliar or URLs that look like spam. If your internet security product includes functionality to
secure online transactions, ensure it is enabled before carrying out financial transactions online.
The key to protecting yourself is being
aware.
Not all cyber criminals are "Hackers".
There is a whole other world that exists in
cyberspace make sure that your information
travels safely.
Conclusion
Technology is destructive only in the hands of people
who do not realise that they are the one and the same
process as the universe.
Thank You For Watching Our
Presentation Peacefully

More Related Content

Similar to Cyber security olive green mint ppt .pdf

Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021KharimMchatta
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 

Similar to Cyber security olive green mint ppt .pdf (20)

Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
CYBER2000.pptx
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Cyber security olive green mint ppt .pdf

  • 1. CYBER CRIME Presented by : Isha Saklani & Kirti Goyal Awareness on Cyber Crime
  • 2. Agenda What is cyber crime? Why it has increased in recent years? Terrifying stats of cybercrimes Worldwide impact of cybercrime How to report against cybercime How to protect against cyber crime
  • 3. Cyber crime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cyber crime is committed by cyber criminals or hackers who want to make money. What is Cyber Crime ?
  • 4. Why it has increased in recent years? Increased levels of connectivity, remote working, reliance on technology, and automation have increased the frequency of cyber crimeAlso, Also, Cybercriminals have used the coronavirus pandemic for their crime Lat year when the whole world took to the online medium due to coronavirus pandemic the frequency of cybercrime increased. Cyber crime are developing and boosting their attacks at an alarming pace, exploiting the fear and uncertainty caused by the unstable social and economic situations created by COVID 19
  • 5. Terryfying stats of Cybercrime The cost of cybercrime is predicted to hit $8 trillion in 2023 and will grow to $10.5 trillion by 2025, according Cybersecurity Ventures' "2022 Official Cybercrime Report," In India, the number of cyber-related crimes reported in 2018 was 208,456. In the first 2 months of 2022 alone, there were a reported 212,485 cyber crimes, more than the entirety of 2018. The figures rose more sharply through the pandemic, with reported crime jumping from 394,499 cases in 2019 to 1,158,208 in 2020 and 1,402,809 in 2021. Between Q1 and Q2 2022, cyber crime across India increased by 15.3%. An average of 97 cybercrime victims per hour which means 2328 per day and 33 billion accounts will be breached in 2023 At 16% phishing was the second most common reason for data breaches and $6 trillion – the damage that cybercrime caused in 2022. Cybercrime has claimed at least 6.5 million victims over a 21-year period from the costliest averaging $ 4.91 million in breach costs. 2001 to 2021 with an estimated loss of nearly $26 billion over the same period.
  • 6. Top 20 countries impacted by cyber crimes
  • 7. MALWARE ATTACKS Any type of malicious software designed to harmor exploit any device, service or network. SPAMMING AND PHISHING Spam is unsolicited email, instant messages, social media messages. Phishing is an email sent from an internet criminal as an email from a legitimate source. IDENTITY THEFT crime of obtaining the personal or financial information of another person to use their identity to commit fraud. DISTRIBUTED DOS ATTACKS are a type of cybercrime attack that cybercriminals use to bring down a system or network. Categories of Cyber Crime
  • 8. CYBER SPYING It typically involves the use of such access to secrets and classified information or control of individual computers CYBER BULLYING It is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms and mobile phones. CYBERTERRORISM is often defined as any premeditated, politically motivated attack against information systems, programs and data that threatens violence or results in violence. SECURITY HACKER It is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Categories of Cyber Crime
  • 9.
  • 10. HOW TO REPORT CYBER CRIME IN INDIA! One can reach out to the National Cyber Crime Reporting portal (Helpline no. - 1930) to register any complaint about cyber crime, including cyber fraud. One can also contact the nearest police station to file your complaint. You can also file your complaint to cybercrime.gov.in
  • 11. 1. Keep software and operating system updated Keeping your software and operating system up to date ensures that you benefit from the latest security patches to protect your computer. 2. Use strong passwords Be sure to use strong passwords that people will not guess and do not record them anywhere or use a reputable password manager to generate strong passwords randomly to make this easier. 3. Never open attachments in spam emails A classic way that computers get infected by malware attacks and other forms of cybercrime is via email attachments in spam emails. Never open an attachment from a sender you do not know.
  • 12. 4. Do not click on links in spam emails or untrusted websites Another way people become victims of cybercrime is by clicking on links in spam emails or other messages, or unfamiliar websites. Avoid doing this to stay safe online. 5. Do not give out personal information unless secure Never give out personal data over the phone or via email unless you are completely sure the line or email is secure. Make certain that you are speaking to the person you think you are. 6. Keep an eye on your bank statements Spotting that you have become a victim of cybercrime quickly is important. Keep an eye on your bank statements and query any unfamiliar transactions with the bank. The bank can investigate whether they are fraudulent. 7. Be mindful of which website URLs you visit Keep an eye on the URLs you are clicking on. Do they look legitimate? Avoid clicking on links with unfamiliar or URLs that look like spam. If your internet security product includes functionality to secure online transactions, ensure it is enabled before carrying out financial transactions online.
  • 13. The key to protecting yourself is being aware. Not all cyber criminals are "Hackers". There is a whole other world that exists in cyberspace make sure that your information travels safely. Conclusion Technology is destructive only in the hands of people who do not realise that they are the one and the same process as the universe.
  • 14. Thank You For Watching Our Presentation Peacefully