SlideShare a Scribd company logo
 Cyber crime refers to any crime that involves a computer and a network.

 Net crime refers to criminal exploitation of the Internet.


    Cybercrimes are defined as: "Offences that are committed against individuals
    or groups of individuals with a criminal motive to intentionally harm the
    reputation of the victim or cause physical or mental harm to the victim directly
    or indirectly, using modern telecommunication networks such as Internet (Chat
    rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)"
 Such crimes may threaten a nation’s security and financial
  health.

 can create cross border tensions.


 also known as CYBER TERRORISM
CRIMES THAT PRIMARILY TARGET COMPUTER
 NETWORKS OR DEVICES INCLUDE:



 Computer viruses


 Denial-of-service attacks


 Malware (malicious code)
CRIMES THAT USE COMPUTER NETWORKS OR
 DEVICES TO ADVANCE OTHER ENDS INCLUDE:


 Cyberstalking


 Fraud and identity theft


 Information warfare


 Phishing scams
COMPUTER VIRUS

 A computer virus is a computer program that can
 replicate itself and spread from one computer to another.

 Viruses can increase their chances of spreading to other
 computers by infecting files on a network file system or
 a file system that is accessed by other computers.
DENIAL-OF-SERVICE ATTACK (DOS ATTACK)
  OR DISTRIBUTED DENIAL-OF-SERVICE
  ATTACK (DDOS ATTACK)

 It is an attempt to make a computer or network resource
  unavailable to its intended users.

 Although the means to carry out, motives for, and targets of a
  DoS attack may vary, it generally consists of the concerted
  efforts of a person, or multiple people to prevent
  an Internet site or service from functioning efficiently or at all,
  temporarily or indefinitely.

 Perpetrators of DoS attacks typically target sites or services
  hosted on high-profile web servers such as banks, credit card
  payment gateways, and even root name servers
MALWARE

 Malware is a general term used to describe any kind of
 software or code specifically designed to exploit a
 computer, or the data it contains, without consent.

 Malware includes computer viruses, worms, trojan
 horses, spyware adware most rootkits and other
 malicious programs
CYBER STALKING

 Stalking is a form of mental assault, in which the
 perpetrator repeatedly, unwantedly, and disruptively
 breaks into the life-world of the victim, with whom he
 has no relationship (or no longer has), with motives that
 are directly or indirectly traceable to the affective
 sphere. Moreover, the separated acts that make up the
 intrusion cannot by themselves cause the mental abuse,
 but do taken together (cumulative effect).
FRAUD


 a fraud is an intentional deception made for personal
 gain or to damage another individual; the related
 adjective is fraudulent.

 Defrauding people or entities of money or valuables is
 a common purpose of fraud, but there have also been
 fraudulent "discoveries", e.g., in science , to gain
 prestige rather than immediate monetary gain.
IDENTITY THEFT


 Identity theft is a form of stealing someone's identity in
 which someone pretends to be someone else by
 assuming that person's identity, typically in order to
 access resources or obtain credit and other benefits in
 that person's name.
INFORMATION WARFARE

 The term Information Warfare (IW) is primarily an
 American concept involving the use and management of
 information technology in pursuit of a competitive
 advantage over an opponent. Information warfare may
 involve collection of tactical
 information, assurance(s) that one's own information is
 valid, spreading
 of propagandaor disinformation to demoralize or
 manipulate the enemy
PHISHING


 Phishing is a way of attempting to acquire information
 such as usernames, passwords and credit card details by
 masquerading as a trustworthy entity in an electronic
 communication.

 Communications purporting to be from popular social
 web sites, auction sites, online payment processors or IT
 administrators are commonly used to lure the
 unsuspecting public.
HOW TO SAVE YOURSELF FROM CYBER
                THEFT

 First of all keep updating your email passwords in
  every 2 months.
 Secondly don’t keep your private informations on
  public websites or social websites.
 Activate double security system in emails and net
  banking.
 Don’t give you’re a/c no and passwords to unknown
  websites.
ANTI CYBER CRIME


 Anti cyber crime organisations are contineously working
 to track these hackers and provide better security
 solotions.

More Related Content

What's hot

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
Adeel Rasheed
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
DINESH KAMBLE
 
Cyber crime
Cyber crimeCyber crime
Bangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global PerspectiveBangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global Perspective
Fakrul Alam
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
sarahj6
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
Marin Ivezic
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
GAURAV. H .TANDON
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
sneha164
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Fit Tri
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
maritesalcantara5
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
ishmecse13
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
Dr. Arun Verma
 

What's hot (20)

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Bangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global PerspectiveBangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global Perspective
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 

Viewers also liked

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Priyankush salouria
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
100701982
 
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Software piracy
Software piracySoftware piracy
Software piracy
Ti-Sun
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 

Viewers also liked (13)

Piracy
PiracyPiracy
Piracy
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer worm
Computer wormComputer worm
Computer worm
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Similar to Cyber theft !!!

Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
Abhishek Viswam
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptx
MuhammadKashif584561
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
TanushreeChakraborty27
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Sukhdev48
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
Cyber Security Services.pptx
Cyber Security Services.pptxCyber Security Services.pptx
Cyber Security Services.pptx
jamesdavis7162
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
windows21
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Ivy Rose Recierdo
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
karanjohar
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
MehwishAnsari11
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
ReinIgnacioUrolaza
 
basics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attackbasics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attack
PILAMPIRAYAsstProfes
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
AdvAbdulMueedAhmad
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
8 Different Types of Cybersecurity and Threats Involved
8 Different Types of Cybersecurity and Threats Involved8 Different Types of Cybersecurity and Threats Involved
8 Different Types of Cybersecurity and Threats Involved
SumitKala7
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptx
adnis1
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
Daniel Martin
 

Similar to Cyber theft !!! (20)

Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptx
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber Security Services.pptx
Cyber Security Services.pptxCyber Security Services.pptx
Cyber Security Services.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
 
basics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attackbasics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attack
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Security threats ecom
Security threats ecomSecurity threats ecom
Security threats ecom
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
8 Different Types of Cybersecurity and Threats Involved
8 Different Types of Cybersecurity and Threats Involved8 Different Types of Cybersecurity and Threats Involved
8 Different Types of Cybersecurity and Threats Involved
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptx
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Cyber theft !!!

  • 1.
  • 2.  Cyber crime refers to any crime that involves a computer and a network.  Net crime refers to criminal exploitation of the Internet.  Cybercrimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)"
  • 3.  Such crimes may threaten a nation’s security and financial health.  can create cross border tensions.  also known as CYBER TERRORISM
  • 4. CRIMES THAT PRIMARILY TARGET COMPUTER NETWORKS OR DEVICES INCLUDE:  Computer viruses  Denial-of-service attacks  Malware (malicious code)
  • 5. CRIMES THAT USE COMPUTER NETWORKS OR DEVICES TO ADVANCE OTHER ENDS INCLUDE:  Cyberstalking  Fraud and identity theft  Information warfare  Phishing scams
  • 6. COMPUTER VIRUS  A computer virus is a computer program that can replicate itself and spread from one computer to another.  Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.
  • 7. DENIAL-OF-SERVICE ATTACK (DOS ATTACK) OR DISTRIBUTED DENIAL-OF-SERVICE ATTACK (DDOS ATTACK)  It is an attempt to make a computer or network resource unavailable to its intended users.  Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.  Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root name servers
  • 8. MALWARE  Malware is a general term used to describe any kind of software or code specifically designed to exploit a computer, or the data it contains, without consent.  Malware includes computer viruses, worms, trojan horses, spyware adware most rootkits and other malicious programs
  • 9. CYBER STALKING  Stalking is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together (cumulative effect).
  • 10. FRAUD  a fraud is an intentional deception made for personal gain or to damage another individual; the related adjective is fraudulent.  Defrauding people or entities of money or valuables is a common purpose of fraud, but there have also been fraudulent "discoveries", e.g., in science , to gain prestige rather than immediate monetary gain.
  • 11. IDENTITY THEFT  Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.
  • 12. INFORMATION WARFARE  The term Information Warfare (IW) is primarily an American concept involving the use and management of information technology in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance(s) that one's own information is valid, spreading of propagandaor disinformation to demoralize or manipulate the enemy
  • 13. PHISHING  Phishing is a way of attempting to acquire information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.  Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.
  • 14. HOW TO SAVE YOURSELF FROM CYBER THEFT  First of all keep updating your email passwords in every 2 months.  Secondly don’t keep your private informations on public websites or social websites.  Activate double security system in emails and net banking.  Don’t give you’re a/c no and passwords to unknown websites.
  • 15. ANTI CYBER CRIME  Anti cyber crime organisations are contineously working to track these hackers and provide better security solotions.