SlideShare a Scribd company logo
1 of 28
CYBER CRIME
Presented By- Sujan
Timalsina
-BICTE
- Jana Bhawana
Campus(JBC)
Lalitpur, Chapagau
1
CONTENT
S
2
• Introduction to Cyber Crime
• Cyber Crime and Adolescent
• Causes of Cyber Crime
• Cyber Crime in Nepal
• Types of Cyber Crime in Nepal
• Effects of Cyber Crime
• Effects of cyber bullying to our generation
• Pace of Nepal Government against Cyber
Crime
• Efforts of Nepal Police to combat cyber
crime
• What cyber law in Nepal defines?
• Safetytips for cyber crime
CYBER CRIME
Introduction
In general words, we can refer cyber
crime as a crime performed by using
computers or a network.
A cyber crime is an act of creating,
distributing, altering, stealing, misusing and
destroying information through a computer
manipulation of cyberspace; without the
use of physical force and against the will or
interest of the victim.
3
• Cyber Crime includes anything
from downloading illegal files to
stealing millions of dollars from
online bank accounts.
• Cybercrime also includes non-
monetary offenses , such as
creating and distributing viruses
on other computers or posting
confidental business information
on the internet.
29 October
2019 4
CYBER CRIME AND
ADOLESCENT
Cyber Crimes are one of the serious issues facing the
modern world at large and especially those involving
adolescents.
Most parents and so most children are not aware of
the consequences of electronic abuse.
Growing up with technology, teens tend to live
online where they share information about their parents,
relationships, friends, achievements,etc. They have an
intense need to connect with others and explore their
personality. The relative anonymity of the Internet
cushion to awkwardness
of adolescence as well. Moreover, peer pressure to
conform often motives a certain online behaviour for
teenagers. But liitle do they know that their reckless
exposure of life on cyber space can push them into
blackhole.
29 October
2019
5
CYBER
CRIME: A 6
7
19 8
CYBER CRIME IN NEPAL
9
• Cyber Crime is one of the fastest growing
areas of crime. More and more criminals
are exploiting the speed,convenience and
anonymity that modern technology offer
inorder to commit a diverse range of
criminal activities.
• Cyber Crime is one of the most
concerned problems of Nepal which
have various negative impact on
people and country.
10
11
12
13
TYPES OF CYBER CRIME IN
NEPAL
14
1. Social Media Related Cyber Crime
2. Piracy Related Crime
3. Fake Profile Marketing
4. Threatening Using Email
5. Website Hacking
6. Unauthorized Access
7. Online Business of Restricted
Materials
1.Social Media Related Cyber
Crime
Social Media related cyber crime in nepal includes using
porn content in social media or creating fake profiles to
intentionally harm someone with the use of facebook
,Instagram,Twitteror any social media platform.
In the year 2070, a total of 19 cases of social
media cybercrimes were reported.With the trending use of
social media
, the number of cases has increased to 35 in 2072.
In the Fiscal Year 2072_-2073 , as many as
560 cases were registered in the first six months of the
yearsaid by the Metropolitan Crime Division in ,Teku.
15
2. Piracy Related Crime
16
Any content which has been
copied to make a duplicate copy is
considered as piracy. Using unauthorized
trademarks and copying source code
without having the license to use it is
considered Piracy Crime.
Example,the font used in company
logos can also be related to piracy crime, if
the font is not listed free for business
purposes. Even though this related crime is
not a possibility in not a possibility context of
Nepal,but we can see a various example of
font piracy.
3.Fake Profile Marketing
Creating or using a fake
profile , fake website or email to
create a bad image or
inappropriate marketing is also
considered as cyber crime. We
can see various examples of fake
profiles, fake website, and spam
emails. Spreading unwanted and
inappropriate message using fake
profile Marketing. This rule also
implies to business where a fake
product is sold. Marketing of fake
duplicate product using the name
of a different brand also comes
under the Fake Marketing Cyber
Crime.
17
4.Threatening using E-mail
18
Email threat is not much common
cyber crime in Nepal .If an email contains
a threat or warning in mentality to harm or
disturb any individual or any organisation ,
this is considered as cyber crime .
5.Website Hacking
Website hacking means taking control from
the website owner to a person who hacks the
website . Nowadays most of the government
websites are attacked by hackers. Many
governmental websites
including the president’s website were hacked.
Any complaint on website hacking can be
serious offence in terms of the cyber law in
Nepal.
Recently , a group of Nepalese
hacker named Anonymous opnep breached
into the server of Nepal Telecom, Hackers
gained access to all details of NTC users that
include username,citizenship name,father’s
name as well as other private information.
Metropolitan Crime Division recently tracked the
hackers down and arrested 18 year old Bikash
Paudel for hacking over 200 websites including
NTC website
19
6.Unauthorized Access
Unauthorized access is
one of the common issues in
cyber crime world.Getting
access to a website,
programme,server,service or
other system using someone
else account or other methods
is called unauthorized access.
Examples of the
unauthorised use of computers
include an employee using a
company computer to send a
personal e-mail or someone
gaining access to a bank
computer and performing an
unauthorised transfer.
20
5.Online Business of Restricted
Materials
The business involving
the buying and selling of
illegal or restricted
materials can be a case of
cyber crime. One
interesting come up when a
Nepali citizen named kirtan
Pokheral was arrested for
creating an event related to
sexual tourism.The event
was named Bunga Bunga
which promised to have
girls of ages 13 to 17.
21
22
23
29 October
2019
24
29 October
2019
25
29 October
2019
26
27
28

More Related Content

Similar to cybercrime-191029040729.pptx ciber crime

Similar to cybercrime-191029040729.pptx ciber crime (20)

cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

cybercrime-191029040729.pptx ciber crime

  • 1. CYBER CRIME Presented By- Sujan Timalsina -BICTE - Jana Bhawana Campus(JBC) Lalitpur, Chapagau 1
  • 2. CONTENT S 2 • Introduction to Cyber Crime • Cyber Crime and Adolescent • Causes of Cyber Crime • Cyber Crime in Nepal • Types of Cyber Crime in Nepal • Effects of Cyber Crime • Effects of cyber bullying to our generation • Pace of Nepal Government against Cyber Crime • Efforts of Nepal Police to combat cyber crime • What cyber law in Nepal defines? • Safetytips for cyber crime
  • 3. CYBER CRIME Introduction In general words, we can refer cyber crime as a crime performed by using computers or a network. A cyber crime is an act of creating, distributing, altering, stealing, misusing and destroying information through a computer manipulation of cyberspace; without the use of physical force and against the will or interest of the victim. 3
  • 4. • Cyber Crime includes anything from downloading illegal files to stealing millions of dollars from online bank accounts. • Cybercrime also includes non- monetary offenses , such as creating and distributing viruses on other computers or posting confidental business information on the internet. 29 October 2019 4
  • 5. CYBER CRIME AND ADOLESCENT Cyber Crimes are one of the serious issues facing the modern world at large and especially those involving adolescents. Most parents and so most children are not aware of the consequences of electronic abuse. Growing up with technology, teens tend to live online where they share information about their parents, relationships, friends, achievements,etc. They have an intense need to connect with others and explore their personality. The relative anonymity of the Internet cushion to awkwardness of adolescence as well. Moreover, peer pressure to conform often motives a certain online behaviour for teenagers. But liitle do they know that their reckless exposure of life on cyber space can push them into blackhole. 29 October 2019 5
  • 7. 7
  • 9. CYBER CRIME IN NEPAL 9 • Cyber Crime is one of the fastest growing areas of crime. More and more criminals are exploiting the speed,convenience and anonymity that modern technology offer inorder to commit a diverse range of criminal activities. • Cyber Crime is one of the most concerned problems of Nepal which have various negative impact on people and country.
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. TYPES OF CYBER CRIME IN NEPAL 14 1. Social Media Related Cyber Crime 2. Piracy Related Crime 3. Fake Profile Marketing 4. Threatening Using Email 5. Website Hacking 6. Unauthorized Access 7. Online Business of Restricted Materials
  • 15. 1.Social Media Related Cyber Crime Social Media related cyber crime in nepal includes using porn content in social media or creating fake profiles to intentionally harm someone with the use of facebook ,Instagram,Twitteror any social media platform. In the year 2070, a total of 19 cases of social media cybercrimes were reported.With the trending use of social media , the number of cases has increased to 35 in 2072. In the Fiscal Year 2072_-2073 , as many as 560 cases were registered in the first six months of the yearsaid by the Metropolitan Crime Division in ,Teku. 15
  • 16. 2. Piracy Related Crime 16 Any content which has been copied to make a duplicate copy is considered as piracy. Using unauthorized trademarks and copying source code without having the license to use it is considered Piracy Crime. Example,the font used in company logos can also be related to piracy crime, if the font is not listed free for business purposes. Even though this related crime is not a possibility in not a possibility context of Nepal,but we can see a various example of font piracy.
  • 17. 3.Fake Profile Marketing Creating or using a fake profile , fake website or email to create a bad image or inappropriate marketing is also considered as cyber crime. We can see various examples of fake profiles, fake website, and spam emails. Spreading unwanted and inappropriate message using fake profile Marketing. This rule also implies to business where a fake product is sold. Marketing of fake duplicate product using the name of a different brand also comes under the Fake Marketing Cyber Crime. 17
  • 18. 4.Threatening using E-mail 18 Email threat is not much common cyber crime in Nepal .If an email contains a threat or warning in mentality to harm or disturb any individual or any organisation , this is considered as cyber crime .
  • 19. 5.Website Hacking Website hacking means taking control from the website owner to a person who hacks the website . Nowadays most of the government websites are attacked by hackers. Many governmental websites including the president’s website were hacked. Any complaint on website hacking can be serious offence in terms of the cyber law in Nepal. Recently , a group of Nepalese hacker named Anonymous opnep breached into the server of Nepal Telecom, Hackers gained access to all details of NTC users that include username,citizenship name,father’s name as well as other private information. Metropolitan Crime Division recently tracked the hackers down and arrested 18 year old Bikash Paudel for hacking over 200 websites including NTC website 19
  • 20. 6.Unauthorized Access Unauthorized access is one of the common issues in cyber crime world.Getting access to a website, programme,server,service or other system using someone else account or other methods is called unauthorized access. Examples of the unauthorised use of computers include an employee using a company computer to send a personal e-mail or someone gaining access to a bank computer and performing an unauthorised transfer. 20
  • 21. 5.Online Business of Restricted Materials The business involving the buying and selling of illegal or restricted materials can be a case of cyber crime. One interesting come up when a Nepali citizen named kirtan Pokheral was arrested for creating an event related to sexual tourism.The event was named Bunga Bunga which promised to have girls of ages 13 to 17. 21
  • 22. 22
  • 23. 23
  • 27. 27
  • 28. 28