SlideShare a Scribd company logo
Presentation on Cyber Crime 
By: Ratnesh Sharma {MCA 5th Semester}
• INTRODUCTION. 
• HISTORY OF CYBER CRIME. 
• CATEGORIES OF CYBER CRIME. 
• WORLDS TOP 10 CYBER CRIMES. 
• TYEPS OF CYBER CRIME. 
• CYBER SECURITY. 
• SAFETY TIPS TO CYBER CRIME. 
• CONCLUSION.
• Cyber crime is an activity done using 
computers and internet. We can say that it is an 
unlawful acts wherein the computer either a 
tool or target or both. 
• It Harms the reputation of the victim or cause 
physical or mental harm to the victim directly or 
indirectly , 
• Its don using modern telecommunication 
networks such as Internet (Chat rooms, 
emails, notice boards and groups) and 
mobile phones (SMS/MMS)
• The first recorded cyber crime took place in 1820. 
• The first spam email took place in 1976 when it was 
sent out over the ARPANT(Advanced Research 
Projects Agency Network ). 
• The first virus was installed on an Apple computer in 
1982 when a high school student, Rich skrenta, 
developed the EIK Cloner.
• We can categorize cyber crime in two ways. 
• The computer as a target :- 
using a computer to attacks other computer, e.g. 
Hacking, virus/worms attacks, Dos attack etc. 
• The computer as a weapon :- 
using a computer to commit real world crime e.g. 
cyber terrorism, credit card fraud and pornography etc.
World top 10 cyber crimes……….
TYPES OF CYBER CRIME
HACKING :- Hacking in simple terms means an illegal access of 
information from a computer system or network . 
• It is also known as CRACKING. 
• Government websites are the hot target of the hackers due to 
the press coverage, it receives. Hackers enjoy the media 
coverage. 
Motive behind the crime called HACKERS 
Motive behind the crime called hacking greed power, publicity, 
revenge etc.
Theft : 
This crime occurs when a person violates copyrights and 
downloads music, movies, games and software. 
Identity Theft: 
In this cyber crime, a criminal accesses data about a person’s 
bank account, credit cards, Social Security, debit card .etc
VIRUS attack : 
• Malicious software that attaches itself to other software. 
• VIRUS , 
• WORMS, 
• TROJAN HORSE , 
• WEB JACKING, 
• E-MAIL BOMBING etc. 
Computer Vandalism: 
• Damaging or destroying data rather than stealing or misusing 
them is called cyber vandalism. 
• These are program that attach themselves to a file and then 
circulate.
Cyber terrorism: 
• Terrorist attacks on the Internet is by distributed denial of service 
attacks, hate websites and hate E-mails , attacks on service 
network etc. 
• Software piracy: 
• Stilling of software through the illegal copying of genuine 
programs. 
• For exp: patch programs ,crack keys. Etc.
Cyber Security : 
Cyber Security involves protection of sensitive personal 
and business information through prevention, detection and 
response to different online attacks. 
Privacy Policy : 
Before submitting your name , e-mail , address, on a website 
look for the sites privacy policy. 
Keep Software Up to Date: 
. Use good password which will be difficult for thieves to 
guess. Do not choose option that allows your computer to 
remember your passwords.
• Use antivirus Software 
• Insert Firewalls 
• Uninstall unnecessary software 
• Maintain backup 
• Check security settings
• As we see that cyber crimes grows at high rate in the world so we 
have to strictly control the ability of unauthorized access of information 
on the wed . 
• In fact , it is highly likely that cyber crime and its hackers will continue 
developing and upgrading to stay ahead of the law. 
• So, to make us a safer we must need cyber security.
Cybercrime

More Related Content

What's hot

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Nazish Jamali
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
Deepam Aggarwal
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Uday Bhaskarwar
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
Tayyab Farooq
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
AashiGupta46
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
Prashant Sharma
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Tarseam Singh
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Sheetal Kandhare
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
jumanne rajabu
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Marite Rojas Ojeda
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mukul Kumar
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
PsychoticBanda
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
Vicky Shah
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Yasmin Ismail
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Shreyash Patel
 
Cyber security
Cyber securityCyber security
Cyber security
manavaneja3
 

What's hot (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Internet security
Internet securityInternet security
Internet security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Crime show
Crime showCrime show
Crime show
A K Deep
 
Crime Shows Genre
Crime Shows GenreCrime Shows Genre
Crime Shows Genre
guestc48c498
 
Criminal justice major
Criminal justice major Criminal justice major
Criminal justice major
Madhan Raj
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
Aryan Ajmer
 
The wonders of studying Italian.
The wonders of studying Italian.The wonders of studying Italian.
The wonders of studying Italian.
ThirdYearAbroad.com
 
Ppt Italian
Ppt ItalianPpt Italian
Ppt Italian
franciscormm
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman
 
Some characteristics of educational system in municipality grude
Some characteristics of educational system in municipality grude Some characteristics of educational system in municipality grude
Some characteristics of educational system in municipality grude
Livia Dobrescu
 
Sat act powerpoint
Sat act powerpointSat act powerpoint
Sat act powerpoint
lcg22
 
Keep Walking Never Give-up!!!!
Keep Walking Never Give-up!!!!Keep Walking Never Give-up!!!!
Keep Walking Never Give-up!!!!
Shrikrishna Puranik
 
Exams, are they really necessary, final exam, assessments
Exams, are they really necessary, final exam, assessmentsExams, are they really necessary, final exam, assessments
Exams, are they really necessary, final exam, assessments
giselle_watts
 
Erwc period 2 bullying powerpoint melissa and ashly new conclusion
Erwc period 2 bullying powerpoint melissa and ashly new conclusionErwc period 2 bullying powerpoint melissa and ashly new conclusion
Erwc period 2 bullying powerpoint melissa and ashly new conclusion
kcurranlitlover
 
The role of homework in education
The role of homework in educationThe role of homework in education
The role of homework in education
Jiayi_Liu
 
Benefit of Homework
Benefit of HomeworkBenefit of Homework
Benefit of Homework
Meiya Ma
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpoint
gmtango
 
School Organisation
School OrganisationSchool Organisation
School Organisation
Sapphirexox
 
Examination and Evaluation
Examination and EvaluationExamination and Evaluation
Examination and Evaluation
jagannath Dange
 
Stalking PowerPoint
Stalking PowerPointStalking PowerPoint
Stalking PowerPoint
Valerie Sparks
 
The Importance Of Getting A Good Night's Sleep
The Importance Of Getting A Good Night's SleepThe Importance Of Getting A Good Night's Sleep
The Importance Of Getting A Good Night's Sleep
Nathan Young
 
Everything You Need to Know About the NEW SAT
Everything You Need to Know About the NEW SATEverything You Need to Know About the NEW SAT
Everything You Need to Know About the NEW SAT
LA Tutors 123
 

Viewers also liked (20)

Crime show
Crime showCrime show
Crime show
 
Crime Shows Genre
Crime Shows GenreCrime Shows Genre
Crime Shows Genre
 
Criminal justice major
Criminal justice major Criminal justice major
Criminal justice major
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
 
The wonders of studying Italian.
The wonders of studying Italian.The wonders of studying Italian.
The wonders of studying Italian.
 
Ppt Italian
Ppt ItalianPpt Italian
Ppt Italian
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Some characteristics of educational system in municipality grude
Some characteristics of educational system in municipality grude Some characteristics of educational system in municipality grude
Some characteristics of educational system in municipality grude
 
Sat act powerpoint
Sat act powerpointSat act powerpoint
Sat act powerpoint
 
Keep Walking Never Give-up!!!!
Keep Walking Never Give-up!!!!Keep Walking Never Give-up!!!!
Keep Walking Never Give-up!!!!
 
Exams, are they really necessary, final exam, assessments
Exams, are they really necessary, final exam, assessmentsExams, are they really necessary, final exam, assessments
Exams, are they really necessary, final exam, assessments
 
Erwc period 2 bullying powerpoint melissa and ashly new conclusion
Erwc period 2 bullying powerpoint melissa and ashly new conclusionErwc period 2 bullying powerpoint melissa and ashly new conclusion
Erwc period 2 bullying powerpoint melissa and ashly new conclusion
 
The role of homework in education
The role of homework in educationThe role of homework in education
The role of homework in education
 
Benefit of Homework
Benefit of HomeworkBenefit of Homework
Benefit of Homework
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpoint
 
School Organisation
School OrganisationSchool Organisation
School Organisation
 
Examination and Evaluation
Examination and EvaluationExamination and Evaluation
Examination and Evaluation
 
Stalking PowerPoint
Stalking PowerPointStalking PowerPoint
Stalking PowerPoint
 
The Importance Of Getting A Good Night's Sleep
The Importance Of Getting A Good Night's SleepThe Importance Of Getting A Good Night's Sleep
The Importance Of Getting A Good Night's Sleep
 
Everything You Need to Know About the NEW SAT
Everything You Need to Know About the NEW SATEverything You Need to Know About the NEW SAT
Everything You Need to Know About the NEW SAT
 

Similar to Cybercrime

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Cyber crimeCyber crime
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Kush Rathod
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Shareb Ismaeel
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Harendra Singh
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aashir Khalil
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 

Similar to Cybercrime (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 

Recently uploaded

制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 

Recently uploaded (20)

制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 

Cybercrime

  • 1. Presentation on Cyber Crime By: Ratnesh Sharma {MCA 5th Semester}
  • 2. • INTRODUCTION. • HISTORY OF CYBER CRIME. • CATEGORIES OF CYBER CRIME. • WORLDS TOP 10 CYBER CRIMES. • TYEPS OF CYBER CRIME. • CYBER SECURITY. • SAFETY TIPS TO CYBER CRIME. • CONCLUSION.
  • 3. • Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both. • It Harms the reputation of the victim or cause physical or mental harm to the victim directly or indirectly , • Its don using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)
  • 4. • The first recorded cyber crime took place in 1820. • The first spam email took place in 1976 when it was sent out over the ARPANT(Advanced Research Projects Agency Network ). • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 5. • We can categorize cyber crime in two ways. • The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. • The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 6. World top 10 cyber crimes……….
  • 8. HACKING :- Hacking in simple terms means an illegal access of information from a computer system or network . • It is also known as CRACKING. • Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS Motive behind the crime called hacking greed power, publicity, revenge etc.
  • 9. Theft : This crime occurs when a person violates copyrights and downloads music, movies, games and software. Identity Theft: In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card .etc
  • 10. VIRUS attack : • Malicious software that attaches itself to other software. • VIRUS , • WORMS, • TROJAN HORSE , • WEB JACKING, • E-MAIL BOMBING etc. Computer Vandalism: • Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. • These are program that attach themselves to a file and then circulate.
  • 11. Cyber terrorism: • Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc. • Software piracy: • Stilling of software through the illegal copying of genuine programs. • For exp: patch programs ,crack keys. Etc.
  • 12.
  • 13. Cyber Security : Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Privacy Policy : Before submitting your name , e-mail , address, on a website look for the sites privacy policy. Keep Software Up to Date: . Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your passwords.
  • 14. • Use antivirus Software • Insert Firewalls • Uninstall unnecessary software • Maintain backup • Check security settings
  • 15. • As we see that cyber crimes grows at high rate in the world so we have to strictly control the ability of unauthorized access of information on the wed . • In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. • So, to make us a safer we must need cyber security.