SlideShare a Scribd company logo
Index 
• Introduction 
• Classification of cyber crimes 
• Fraud and Financial crimes 
• Obscene or offensive content 
• Harassment 
• Online shopping fraud 
• Drug trafficking 
• Cyber terrorism 
• Cyber warfare 
• Cyber Crime variants 
• Top 10 Cyber Crime Prevention Tips 
• Threats 
• Conclusion
Introduction:- 
• Definition 
• Commission of a crime 
• Internet and mobile phones 
• Threaten to nation’s security and financial health. 
• Problems of when there is no evidence
Types of cyber crime:- 
• Crimes that target computers directly 
• Crimes facilitated by computer networks or 
devices
Cause of cyber crime:- 
Computer viruses 
 
Denial-of-service attack 
 Malware (malicious code) 
 Spam
Computer networks or devices to 
advance other ends include:- 
Cyber stalking 
 Fraud and identity theft 
 Information warfare 
 Phishing scams
Fraud and Financial Crimes:- 
• Entering False information 
• Destroying data 
• Scams target consumers
Obscene or offensive content:- 
• Communications may be illegal. 
• Unlawful varies greatly between countries, and 
even within nations. 
• It is a sensitive area 
• Internet pornography 
• Altering in an unauthorized way
Harassment:- 
• Definition 
• Source 
• Involvement of a computer 
• Example 
• Passing Laws to ban cyber crime 
• Why harassment occurs over the internet. 
• Bullying over the internet may occur for no reason.
Threat’s 
• Definition:- 
• Various address changement 
• Various attacks
Drug trafficking:- 
• Internet promotes drug trafficking 
• From where drug trafficking evolved 
• Lack of face to face communication 
• Platform for illegal drugs purchase .
Cyber terrorism:- 
• Definition 
• Increase in Internet problems and server scans 
since early 2001. 
• Groups to map potential security holes in critical 
systems. 
• How cyber terrorist works ? 
• Cyber extortion is a form of cyber terrorism
Cyber Crime variants:-
Cyber stalking:- 
• Use of the Internet 
• Online harassment and online abuse 
• Harassing or threatening
Hacking:- 
• Cracking systems 
• Gaining unauthorized access 
• 37 per cent increase this year
Phishing:- 
• Fooling people 
• Unsolicited emails 
• Fraudulent replica 
• Access to the customer's online bank 
account 
• F-Secure Corporation's summary of 'data 
security’
Cross site scripting:- 
• Cross-site scripting (XSS) is a type of computer 
security vulnerability typically found in web 
applications which allow code injection by 
malicious web users into the web pages viewed 
by other users. 
• Examples of such code include HTML code and 
client-side scripts. 
• An exploited cross-site scripting vulnerability can 
be used by attackers to bypass access controls.
Vishing:- 
• What is Vishing ? 
• The victim is often unaware about VoIP 
• Aim of vishing
Bot Networks:- 
• Remotely take control of computers without the users 
realizing it 
• Download malicious codes 
• Zombies can for vulneracli 
• increase the speed and breadth of their attacks. 
• Backdoor 
• Problems for organizations
Documented cases:- 
• Posting passwords online. 
• Stealing credit card information. 
• Hacking military's web site. 
• Melissa worm. 
• Mafia boy
Combating Computer Crime:- 
• Source of evidence. 
• Records. 
• Login for predetermined amount of time.
Cyber Crime Prevention Technique:- 
Use Strong Passwords 
Secure your computer 
Be Social-Media Savvy 
Secure your Mobile Device 
Install the latest operating system updates 
Protect your Data 
 Secure your wireless network 
 Protect your e-identity 
Avoid being scammed 
Call the right person for help
Online Shopping Fraud:- 
• What is Online Shopping Fraud. 
• What is Online Auction Fraud. 
• How to protect your self.
Tips to avoid cyber crime:- 
• Unsolicited emails 
• Infected attachments 
• Restricted Sharing of files & Personal information 
• Don’t use Free software 
• Use Anti-virus & turn on Firewall 
• Use Strong Password
Conclusion:- 
• Growing IT sector in country. 
• How to reduce cyber theft’s ? 
• Precautions to avoid cyber attacks.
Future about Cyber Crime:- 
• Smart is the KEY for all home appliance’s 
• Drawbacks of advanced techniques 
• Hacking your car 
• Unauthorized Cloud access 
• Digital Kidnapping
•Thank you….. 
•Any queries..????
-:SUBMITTED BY:- 
KRISHNAKANT MISHRA

More Related Content

What's hot

Cyber Crime - What is it ?
Cyber Crime - What is it ?Cyber Crime - What is it ?
Cyber Crime - What is it ?
Mubaraka Halvadwala
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
Vasundhara Singh Gautam
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
Md. Mehadi Hassan Bappy
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
Shreeraj Nair
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
robinlgray
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
Tayyab Farooq
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
Quick Heal Technologies Ltd.
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
Network Intelligence India
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
Phishing
PhishingPhishing
Phishing
Alka Falwaria
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Avinash Rajput
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 

What's hot (20)

Cyber Crime - What is it ?
Cyber Crime - What is it ?Cyber Crime - What is it ?
Cyber Crime - What is it ?
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime’s
Cyber crime’sCyber crime’s
Cyber crime’s
Reeshabh Chaudhary
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Pragnesh Ghoda
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
centralohioissa
 
Mysql
MysqlMysql
Mysql
Rathan Raj
 
Apache
ApacheApache
Apache
Rathan Raj
 
Learn PHP MySQL with Project
Learn PHP MySQL with ProjectLearn PHP MySQL with Project
Learn PHP MySQL with Projectayman diab
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
daniyalqureshi712
 
Maria db the new mysql (Colin Charles)
Maria db the new mysql (Colin Charles)Maria db the new mysql (Colin Charles)
Maria db the new mysql (Colin Charles)
Ontico
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Muhammad Irfan
 
CFMA Cyber Crime Presentation
CFMA Cyber Crime PresentationCFMA Cyber Crime Presentation
CFMA Cyber Crime Presentation
Steve Machesney
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
MySQL Backup & Recovery
MySQL Backup & RecoveryMySQL Backup & Recovery
MySQL Backup & Recovery
Mindfire Solutions
 
FBI Cybercrime Presentation
FBI Cybercrime PresentationFBI Cybercrime Presentation
FBI Cybercrime Presentation
Stanislaus County Office of Education
 
Xampp Ppt
Xampp PptXampp Ppt
Xampp Ppt
guestb4b8d8e
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
karanwayne
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rafel Ivgi
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
Raghunath G
 
Introduction to xampp
Introduction to xamppIntroduction to xampp
Introduction to xampp
Jin Castor
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 

Viewers also liked (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime’s
Cyber crime’sCyber crime’s
Cyber crime’s
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Mysql
MysqlMysql
Mysql
 
Apache
ApacheApache
Apache
 
Learn PHP MySQL with Project
Learn PHP MySQL with ProjectLearn PHP MySQL with Project
Learn PHP MySQL with Project
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Maria db the new mysql (Colin Charles)
Maria db the new mysql (Colin Charles)Maria db the new mysql (Colin Charles)
Maria db the new mysql (Colin Charles)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CFMA Cyber Crime Presentation
CFMA Cyber Crime PresentationCFMA Cyber Crime Presentation
CFMA Cyber Crime Presentation
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
MySQL Backup & Recovery
MySQL Backup & RecoveryMySQL Backup & Recovery
MySQL Backup & Recovery
 
FBI Cybercrime Presentation
FBI Cybercrime PresentationFBI Cybercrime Presentation
FBI Cybercrime Presentation
 
Xampp Ppt
Xampp PptXampp Ppt
Xampp Ppt
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
 
Introduction to xampp
Introduction to xamppIntroduction to xampp
Introduction to xampp
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 

Similar to CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
RahulDhanware2
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
ACCA Global
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
rishith23
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
Hîmãlåy Làdhä
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ratnesh Sharma
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
Talwant Singh
 
Cyber security
Cyber securityCyber security
Cyber security
PawanKalyanAmbati
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
Simon Salter
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Abdul Rehman
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
sweta dargad
 

Similar to CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA (20)

cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 

Recently uploaded

NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
sachin chaurasia
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt
abdatawakjira
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
AnasAhmadNoor
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 

Recently uploaded (20)

NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 

CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

  • 1.
  • 2. Index • Introduction • Classification of cyber crimes • Fraud and Financial crimes • Obscene or offensive content • Harassment • Online shopping fraud • Drug trafficking • Cyber terrorism • Cyber warfare • Cyber Crime variants • Top 10 Cyber Crime Prevention Tips • Threats • Conclusion
  • 3. Introduction:- • Definition • Commission of a crime • Internet and mobile phones • Threaten to nation’s security and financial health. • Problems of when there is no evidence
  • 4. Types of cyber crime:- • Crimes that target computers directly • Crimes facilitated by computer networks or devices
  • 5. Cause of cyber crime:- Computer viruses  Denial-of-service attack  Malware (malicious code)  Spam
  • 6. Computer networks or devices to advance other ends include:- Cyber stalking  Fraud and identity theft  Information warfare  Phishing scams
  • 7. Fraud and Financial Crimes:- • Entering False information • Destroying data • Scams target consumers
  • 8. Obscene or offensive content:- • Communications may be illegal. • Unlawful varies greatly between countries, and even within nations. • It is a sensitive area • Internet pornography • Altering in an unauthorized way
  • 9. Harassment:- • Definition • Source • Involvement of a computer • Example • Passing Laws to ban cyber crime • Why harassment occurs over the internet. • Bullying over the internet may occur for no reason.
  • 10. Threat’s • Definition:- • Various address changement • Various attacks
  • 11. Drug trafficking:- • Internet promotes drug trafficking • From where drug trafficking evolved • Lack of face to face communication • Platform for illegal drugs purchase .
  • 12. Cyber terrorism:- • Definition • Increase in Internet problems and server scans since early 2001. • Groups to map potential security holes in critical systems. • How cyber terrorist works ? • Cyber extortion is a form of cyber terrorism
  • 14. Cyber stalking:- • Use of the Internet • Online harassment and online abuse • Harassing or threatening
  • 15. Hacking:- • Cracking systems • Gaining unauthorized access • 37 per cent increase this year
  • 16. Phishing:- • Fooling people • Unsolicited emails • Fraudulent replica • Access to the customer's online bank account • F-Secure Corporation's summary of 'data security’
  • 17. Cross site scripting:- • Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. • Examples of such code include HTML code and client-side scripts. • An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls.
  • 18. Vishing:- • What is Vishing ? • The victim is often unaware about VoIP • Aim of vishing
  • 19. Bot Networks:- • Remotely take control of computers without the users realizing it • Download malicious codes • Zombies can for vulneracli • increase the speed and breadth of their attacks. • Backdoor • Problems for organizations
  • 20. Documented cases:- • Posting passwords online. • Stealing credit card information. • Hacking military's web site. • Melissa worm. • Mafia boy
  • 21. Combating Computer Crime:- • Source of evidence. • Records. • Login for predetermined amount of time.
  • 22. Cyber Crime Prevention Technique:- Use Strong Passwords Secure your computer Be Social-Media Savvy Secure your Mobile Device Install the latest operating system updates Protect your Data  Secure your wireless network  Protect your e-identity Avoid being scammed Call the right person for help
  • 23. Online Shopping Fraud:- • What is Online Shopping Fraud. • What is Online Auction Fraud. • How to protect your self.
  • 24. Tips to avoid cyber crime:- • Unsolicited emails • Infected attachments • Restricted Sharing of files & Personal information • Don’t use Free software • Use Anti-virus & turn on Firewall • Use Strong Password
  • 25. Conclusion:- • Growing IT sector in country. • How to reduce cyber theft’s ? • Precautions to avoid cyber attacks.
  • 26. Future about Cyber Crime:- • Smart is the KEY for all home appliance’s • Drawbacks of advanced techniques • Hacking your car • Unauthorized Cloud access • Digital Kidnapping
  • 27. •Thank you….. •Any queries..????