SlideShare a Scribd company logo
1 of 11
Cybercrime
By Chitrita
What is CyberCrime?
Cybercrime, also known as computer crime, is the use of
a computer as an instrument to further illegal ends, such
as committing fraud, trafficking in child pornography
and intellectual property, stealing identities, or violating
privacy.
Cybercrime, especially through the internet, has grown in
importance as the computer has become central to
commerce, entertainment, and government.
What distinguishes cybercrime from
traditional criminal activity?
One difference is the use of the digital computer, but technology alone is
insufficient for any distinction that might exist between different realms
of criminal activity.
Criminals do not need a computer to commit fraud, traffic in child
pornography and intellectual property, steal an identity, or violate
someone’s privacy.
All those activities existed before the “cyber” prefix become ubiquitous.
Cybercrime, especially involving the internet, represents an extension of
existing criminal behaviour alongside some novel illegal activities.
Types of Cybercrime
Internet frauds
include spam, scams, spyware, identity
theft, phishing or internet banking
fraud
ATM frauds
a fraudulent activity where the criminal
uses the ATM card of another person
to withdraw money instantly from that
account.
Wire frauds
a federal crime involving defrauding an
individual or a party using electronic
communication.
Hacking
most commonly associated with illegal
activity and data theft by cyber
criminals.
01
03
02
04
Types of Cybercrime
Piracy
act of illegally reproducing or
disseminating copyrighted material,
such as computer programs, books,
music, and films.
Computer virus
They are delivered as email
attachments, malicious code on
suspect websites or through
removable media such as flash drives.
Sabotage
Countries or criminals attack computer
systems in order to disrupt online
services.
Denial of service
an attack meant to shut down a
machine or network, making it
inaccessible to its intended users.
05
07
06
08
A case representing
Cyber fraud
A 32-year-old man, who is engaged as a private security guard for
former legendary India cricketer Sachin Tendulkar fell prey to an
online scam and lost Rs 18,200.
a fraudster called him posing as an executive of Kotak Mahindra
bank at around 10 am on July 13 on his mobile phone number and
asked him if he required a loan. As the security guard was in need of
money, he agreed to take a loan.
The cyber fraudster then asked him to send details of his AADHAR
card, PAN card, debit card, and credit card on a Whatsapp number.
Accordingly, the complainant sent all the details asked by the
fraudster.
The fraudsters then sent him Rs 10,000 and using the security
guard’s credit card details, generated an OTP to debit Rs 18,200 from
his account.
The complainant then shared the OTP as asked by the fraudster and
Rs 18,200 got debited from his bank account.
The fraudster again called back the complainant the next day and
asked him to send Rs 10,000 as a processing fee following which Rs
1.50 lakh as the loan will be disbursed to his account.
However, the complainant realised he was being duped and
approached the Bandra Police for help.
Now how can we prevent
ourselves from such
scams?
Firstly, banks will never ask for your bank account, credit
and debit card details. If a caller represents himself as a
bank employer and asks for such details, it’s a scam.
And secondly, never share your OTP with an unknown
person and avoid sharing the same through mobile in public
areas.
Hi babe!

More Related Content

Similar to Cybercrime

Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber CrimeDeepak Kumar
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020Rahul Boga
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptxRahuljain40418
 
Awareness of Sim Swap Attack
Awareness of Sim Swap AttackAwareness of Sim Swap Attack
Awareness of Sim Swap Attackijtsrd
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
cybercrimeppt-1209241214217-phpapp01.ppt
cybercrimeppt-1209241214217-phpapp01.pptcybercrimeppt-1209241214217-phpapp01.ppt
cybercrimeppt-1209241214217-phpapp01.pptSIRINET2
 

Similar to Cybercrime (20)

Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Business law
Business lawBusiness law
Business law
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Emp...err
Emp...errEmp...err
Emp...err
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
Awareness of Sim Swap Attack
Awareness of Sim Swap AttackAwareness of Sim Swap Attack
Awareness of Sim Swap Attack
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber law11
Cyber law11Cyber law11
Cyber law11
 
cybercrimeppt-1209241214217-phpapp01.ppt
cybercrimeppt-1209241214217-phpapp01.pptcybercrimeppt-1209241214217-phpapp01.ppt
cybercrimeppt-1209241214217-phpapp01.ppt
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Cybercrime

  • 2. What is CyberCrime? Cybercrime, also known as computer crime, is the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the internet, has grown in importance as the computer has become central to commerce, entertainment, and government.
  • 3. What distinguishes cybercrime from traditional criminal activity? One difference is the use of the digital computer, but technology alone is insufficient for any distinction that might exist between different realms of criminal activity. Criminals do not need a computer to commit fraud, traffic in child pornography and intellectual property, steal an identity, or violate someone’s privacy. All those activities existed before the “cyber” prefix become ubiquitous. Cybercrime, especially involving the internet, represents an extension of existing criminal behaviour alongside some novel illegal activities.
  • 4. Types of Cybercrime Internet frauds include spam, scams, spyware, identity theft, phishing or internet banking fraud ATM frauds a fraudulent activity where the criminal uses the ATM card of another person to withdraw money instantly from that account. Wire frauds a federal crime involving defrauding an individual or a party using electronic communication. Hacking most commonly associated with illegal activity and data theft by cyber criminals. 01 03 02 04
  • 5. Types of Cybercrime Piracy act of illegally reproducing or disseminating copyrighted material, such as computer programs, books, music, and films. Computer virus They are delivered as email attachments, malicious code on suspect websites or through removable media such as flash drives. Sabotage Countries or criminals attack computer systems in order to disrupt online services. Denial of service an attack meant to shut down a machine or network, making it inaccessible to its intended users. 05 07 06 08
  • 7. A 32-year-old man, who is engaged as a private security guard for former legendary India cricketer Sachin Tendulkar fell prey to an online scam and lost Rs 18,200. a fraudster called him posing as an executive of Kotak Mahindra bank at around 10 am on July 13 on his mobile phone number and asked him if he required a loan. As the security guard was in need of money, he agreed to take a loan. The cyber fraudster then asked him to send details of his AADHAR card, PAN card, debit card, and credit card on a Whatsapp number. Accordingly, the complainant sent all the details asked by the fraudster.
  • 8. The fraudsters then sent him Rs 10,000 and using the security guard’s credit card details, generated an OTP to debit Rs 18,200 from his account. The complainant then shared the OTP as asked by the fraudster and Rs 18,200 got debited from his bank account. The fraudster again called back the complainant the next day and asked him to send Rs 10,000 as a processing fee following which Rs 1.50 lakh as the loan will be disbursed to his account. However, the complainant realised he was being duped and approached the Bandra Police for help.
  • 9. Now how can we prevent ourselves from such scams?
  • 10. Firstly, banks will never ask for your bank account, credit and debit card details. If a caller represents himself as a bank employer and asks for such details, it’s a scam. And secondly, never share your OTP with an unknown person and avoid sharing the same through mobile in public areas.