SlideShare a Scribd company logo
Index
• Introduction
• Classification of cybercrimes
• Fraudand Financialcrimes
• Obscene or offensivecontent
• Harassment
• Online shoppingfraud
• Drug trafficking
• Cyberterrorism
• Cyberwarfare
• Cyber Crimevariants
• Top10CyberCrime PreventionTips
• Threats
• Conclusion
Introduction:-
• Definition
• Internet and mobile phones
• Threaten to nation’s security and financial health.
• Problems of when there is no evidence
Types of cybercrime:-
• Crimes that target computers directly
• Crimes facilitated by computer networks or
devices
Cause of cybercrime:-
Computer viruses
Spyware
Malware (maliciouscode)
Spam
Cyber Crimevariants:-
Cyberstalking:-
• Use of theInternet
• Online harassment and online abuse
• Harassing orthreatening
Hacking:-
• Cracking systems
• Gaining unauthorizedaccess
• 37per cent increasethis year
Phishing:-
•Fooling people
•Unsolicitedemails
•Fraudulent replica
•Access to the customer's online bank
account
•F-SecureCorporation's summary of 'data
security’
Cross sitescripting:-
• Definition ofCross-site scripting (XSS)
• Examples of such code include HTML code and
client-side scripts.
• An exploitedXSS vulnerabilitycan be used by
attackers to bypass access controls.
Vishing:-
•What isVishing ?
• The victim is often unaware aboutVoIP
•Aim ofvishing
Bot Networks:-
• Remotely take control of computers without the users
realizing it
• Download maliciouscodes
• increase the speed and breadth of their attacks.
• Backdoor
• Problems fororganizations
Fraud and FinancialCrimes:-
•Entering Falseinformation
•Destroying data
•Scams targetconsumers
Obscene or offensivecontent:-
• Communications may beillegal.
• Unlawful varies greatly between countries, and
even withinnations.
• It is a sensitive area
• Internetpornography
• Altering in an unauthorized way
Online ShoppingFraud:-
•What isOnlineShopping Fraud.
•What isOnlineAuction Fraud.
•How to protect your self.
Harassment:-
• Definition
• Source
• Involvement of acomputer
• Example
• Passing Laws to ban cybercrime
• Why harassment occursoverthe internet.
• Bullying overthe internetmay occurfor no reason.
Drug trafficking:-
•Internetpromotes drug trafficking
•From wheredrug traffickingevolved
•Lack of faceto facecommunication
•Platform for illegal drugs purchase.
Cyberterrorism:-
• Definition
• Increase in Internetproblems and server scans
since early2001.
• Groups to map potential security holes in critical
systems.
• How cyberterrorist works ?
• Cyber extortion is a form of cyber terrorism
CombatingComputer Crime:-
• Source ofevidence.
• Records.
• Login for predetermined amount of time.
Documented cases:-
• Posting passwordsonline.
• Stealing credit cardinformation.
• Hackingmilitary's web site.
• Melissa worm.
• Mafia boy
I.T.Security:-
Definition
Why I.T.Security came into existence ?
Rules ofI.T.Security
CyberCrime PreventionTechnique:-
Use StrongPasswords
Secure yourcomputer
Be Social-MediaSavvy
Secure your Mobile Device
Install the latest operating system updates
Protect yourData
 Secure your wireless network
 Protect youre-identity
Avoid beingscammed
Call the right person for help
Future aboutCyberCrime:-
•Smart is the KEY for allhome appliance’s
•Drawbacks of advanced techniques
•Hacking yourcar
•Unauthorized Cloudaccess
•Digital Kidnapping
Conclusion:-
•Growing IT sector in country.
•How to reduce cyber theft’s?
•Precautionsto avoid cyberattacks.
•Thank you…..
•Any queries..????
References:-
Workshops conducted byCyberCrime authorities
Wikipedia
Cyber lawand ethics 2014
TeamMembers
DeepakSujith
SachinChauhan
Krishnakant Mishra

More Related Content

Similar to cybercrime.pptx

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
Online
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
81-220-1 Chapter 14
81-220-1 Chapter 1481-220-1 Chapter 14
81-220-1 Chapter 14
mpalaro
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
Jyotisheklingji
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
lichuyuliting
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
lichuyuliting
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
lichuyuliting
 
Cyber crime is around us
Cyber crime is around usCyber crime is around us
Cyber crime is around us
lichuyuliting
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Shareb Ismaeel
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
Hîmãlåy Làdhä
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
Simon Salter
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Computer Forensics
Computer ForensicsComputer Forensics
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
Arshad Khan
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
Talwant Singh
 

Similar to cybercrime.pptx (20)

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
81-220-1 Chapter 14
81-220-1 Chapter 1481-220-1 Chapter 14
81-220-1 Chapter 14
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
Cyber crime is around us
Cyber crime is around usCyber crime is around us
Cyber crime is around us
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 

Recently uploaded

How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 

Recently uploaded (20)

How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 

cybercrime.pptx