Index 
• Introduction 
• Classification of cyber crimes 
• Fraud and Financial crimes 
• Obscene or offensive content 
• Harassment 
• Online shopping fraud 
• Drug trafficking 
• Cyber terrorism 
• Cyber warfare 
• Cyber Crime variants 
• Top 10 Cyber Crime Prevention Tips 
• Threats 
• Conclusion
Introduction:- 
• Definition 
• Commission of a crime 
• Internet and mobile phones 
• Threaten to nation’s security and financial health. 
• Problems of when there is no evidence
Types of cyber crime:- 
• Crimes that target computers directly 
• Crimes facilitated by computer networks or 
devices
Cause of cyber crime:- 
Computer viruses 
 
Denial-of-service attack 
 Malware (malicious code) 
 Spam
Computer networks or devices to 
advance other ends include:- 
Cyber stalking 
 Fraud and identity theft 
 Information warfare 
 Phishing scams
Fraud and Financial Crimes:- 
• Entering False information 
• Destroying data 
• Scams target consumers
Obscene or offensive content:- 
• Communications may be illegal. 
• Unlawful varies greatly between countries, and 
even within nations. 
• It is a sensitive area 
• Internet pornography 
• Altering in an unauthorized way
Harassment:- 
• Definition 
• Source 
• Involvement of a computer 
• Example 
• Passing Laws to ban cyber crime 
• Why harassment occurs over the internet. 
• Bullying over the internet may occur for no reason.
Threat’s 
• Definition:- 
• Various address changement 
• Various attacks
Drug trafficking:- 
• Internet promotes drug trafficking 
• From where drug trafficking evolved 
• Lack of face to face communication 
• Platform for illegal drugs purchase .
Cyber terrorism:- 
• Definition 
• Increase in Internet problems and server scans 
since early 2001. 
• Groups to map potential security holes in critical 
systems. 
• How cyber terrorist works ? 
• Cyber extortion is a form of cyber terrorism
Cyber Crime variants:-
Cyber stalking:- 
• Use of the Internet 
• Online harassment and online abuse 
• Harassing or threatening
Hacking:- 
• Cracking systems 
• Gaining unauthorized access 
• 37 per cent increase this year
Phishing:- 
• Fooling people 
• Unsolicited emails 
• Fraudulent replica 
• Access to the customer's online bank 
account 
• F-Secure Corporation's summary of 'data 
security’
Cross site scripting:- 
• Cross-site scripting (XSS) is a type of computer 
security vulnerability typically found in web 
applications which allow code injection by 
malicious web users into the web pages viewed 
by other users. 
• Examples of such code include HTML code and 
client-side scripts. 
• An exploited cross-site scripting vulnerability can 
be used by attackers to bypass access controls.
Vishing:- 
• What is Vishing ? 
• The victim is often unaware about VoIP 
• Aim of vishing
Bot Networks:- 
• Remotely take control of computers without the users 
realizing it 
• Download malicious codes 
• Zombies can for vulneracli 
• increase the speed and breadth of their attacks. 
• Backdoor 
• Problems for organizations
Documented cases:- 
• Posting passwords online. 
• Stealing credit card information. 
• Hacking military's web site. 
• Melissa worm. 
• Mafia boy
Combating Computer Crime:- 
• Source of evidence. 
• Records. 
• Login for predetermined amount of time.
Cyber Crime Prevention Technique:- 
Use Strong Passwords 
Secure your computer 
Be Social-Media Savvy 
Secure your Mobile Device 
Install the latest operating system updates 
Protect your Data 
 Secure your wireless network 
 Protect your e-identity 
Avoid being scammed 
Call the right person for help
Online Shopping Fraud:- 
• What is Online Shopping Fraud. 
• What is Online Auction Fraud. 
• How to protect your self.
Tips to avoid cyber crime:- 
• Unsolicited emails 
• Infected attachments 
• Restricted Sharing of files & Personal information 
• Don’t use Free software 
• Use Anti-virus & turn on Firewall 
• Use Strong Password
Conclusion:- 
• Growing IT sector in country. 
• How to reduce cyber theft’s ? 
• Precautions to avoid cyber attacks.
Future about Cyber Crime:- 
• Smart is the KEY for all home appliance’s 
• Drawbacks of advanced techniques 
• Hacking your car 
• Unauthorized Cloud access 
• Digital Kidnapping
•Thank you….. 
•Any queries..????
-:SUBMITTED BY:- 
KRISHNAKANT MISHRA

CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

  • 2.
    Index • Introduction • Classification of cyber crimes • Fraud and Financial crimes • Obscene or offensive content • Harassment • Online shopping fraud • Drug trafficking • Cyber terrorism • Cyber warfare • Cyber Crime variants • Top 10 Cyber Crime Prevention Tips • Threats • Conclusion
  • 3.
    Introduction:- • Definition • Commission of a crime • Internet and mobile phones • Threaten to nation’s security and financial health. • Problems of when there is no evidence
  • 4.
    Types of cybercrime:- • Crimes that target computers directly • Crimes facilitated by computer networks or devices
  • 5.
    Cause of cybercrime:- Computer viruses  Denial-of-service attack  Malware (malicious code)  Spam
  • 6.
    Computer networks ordevices to advance other ends include:- Cyber stalking  Fraud and identity theft  Information warfare  Phishing scams
  • 7.
    Fraud and FinancialCrimes:- • Entering False information • Destroying data • Scams target consumers
  • 8.
    Obscene or offensivecontent:- • Communications may be illegal. • Unlawful varies greatly between countries, and even within nations. • It is a sensitive area • Internet pornography • Altering in an unauthorized way
  • 9.
    Harassment:- • Definition • Source • Involvement of a computer • Example • Passing Laws to ban cyber crime • Why harassment occurs over the internet. • Bullying over the internet may occur for no reason.
  • 10.
    Threat’s • Definition:- • Various address changement • Various attacks
  • 11.
    Drug trafficking:- •Internet promotes drug trafficking • From where drug trafficking evolved • Lack of face to face communication • Platform for illegal drugs purchase .
  • 12.
    Cyber terrorism:- •Definition • Increase in Internet problems and server scans since early 2001. • Groups to map potential security holes in critical systems. • How cyber terrorist works ? • Cyber extortion is a form of cyber terrorism
  • 13.
  • 14.
    Cyber stalking:- •Use of the Internet • Online harassment and online abuse • Harassing or threatening
  • 15.
    Hacking:- • Crackingsystems • Gaining unauthorized access • 37 per cent increase this year
  • 16.
    Phishing:- • Foolingpeople • Unsolicited emails • Fraudulent replica • Access to the customer's online bank account • F-Secure Corporation's summary of 'data security’
  • 17.
    Cross site scripting:- • Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. • Examples of such code include HTML code and client-side scripts. • An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls.
  • 18.
    Vishing:- • Whatis Vishing ? • The victim is often unaware about VoIP • Aim of vishing
  • 19.
    Bot Networks:- •Remotely take control of computers without the users realizing it • Download malicious codes • Zombies can for vulneracli • increase the speed and breadth of their attacks. • Backdoor • Problems for organizations
  • 20.
    Documented cases:- •Posting passwords online. • Stealing credit card information. • Hacking military's web site. • Melissa worm. • Mafia boy
  • 21.
    Combating Computer Crime:- • Source of evidence. • Records. • Login for predetermined amount of time.
  • 22.
    Cyber Crime PreventionTechnique:- Use Strong Passwords Secure your computer Be Social-Media Savvy Secure your Mobile Device Install the latest operating system updates Protect your Data  Secure your wireless network  Protect your e-identity Avoid being scammed Call the right person for help
  • 23.
    Online Shopping Fraud:- • What is Online Shopping Fraud. • What is Online Auction Fraud. • How to protect your self.
  • 24.
    Tips to avoidcyber crime:- • Unsolicited emails • Infected attachments • Restricted Sharing of files & Personal information • Don’t use Free software • Use Anti-virus & turn on Firewall • Use Strong Password
  • 25.
    Conclusion:- • GrowingIT sector in country. • How to reduce cyber theft’s ? • Precautions to avoid cyber attacks.
  • 26.
    Future about CyberCrime:- • Smart is the KEY for all home appliance’s • Drawbacks of advanced techniques • Hacking your car • Unauthorized Cloud access • Digital Kidnapping
  • 27.
  • 28.