SlideShare a Scribd company logo
1 of 12
SUBMITTED TO:MRS. SUMANDEEP KAUR
SUBMITTED BY: MISS. HIMANSHI
: MISS. KIRANDEEP KAUR
:MR. JOBANPREET SINGH
 History of Cyber Crime.
 Introduction of Cyber Crime.
 Categories of Cyber Crime.
 Types of Cyber Crime.
 Cyber Security.
 Benefits of Cyber Security.
 Cyber Crime in India.
 How to prevent Cyber Crime.
 Conclusion.
 Bibliography.
The First Cyber Crime Recorded in late 1820. yes, it’s a
shocking fact!!! Abacus, which is thought to be the
earliest form of a computer ,has been around since
3500 B.C. in India, Japan and China. Joseph-Marie
Jacquard , a textile manufacturer in France , produced
the loom. This device allowed the repetition of a series
of steps in the weaving of special fabrics. This resulted
in a fear amongst Jacquard’s employees that their
traditional employment and livelihood were being
threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new
technology. This is the first recorded Cyber Crime!!
 CYBER CRIME is also known as COMPUTER-
ORIENTED CRIME.
 Cybercrimes can be defined as: “offences that are
committed against individuals or groups of individuals
with a criminal motive to intentionally harm the
reputation of the victim”.
 Cybercrime may threaten a person or a nation’s
security and financial health.
 Issues surroundings these types of crimes have become
high-Profile, Particularly those surroundings hacking,
copyright infringement and child grooming.
Cyber Crimes are broadly categorized into three categories,
namely crime against
1) INDIVIDUAL: This type of crime can be in the form of
Cyber Stalking, Distributing Pornography, Trafficking
and “Grooming”.
2) PROPERTY: In this type of cyber crime, they can steel a
person’s bank details, misuse the credit card, or disrupt
the system of the organization.
3) GOVERNMENT: Although not as common as the other
two categories, crimes against a government are referred
to as cyber terrorism. In this category, criminals hack
government websites, military websites or circulate
propaganda.
 Fraud
 Hacking
 Identity Theft
 Scamming
 Computer Viruses
 Spamming
 Phishing
 Social Engineering
 Software Piracy
 Child Pornograph
Cyber Security is the protection of computer systems
from theft of or damage to their hardware, software or
electronic data , as well as from disruption or
misdirection of the service they provide. Cyber
Security is necessary since it helps in securing data
from threats such as data theft or misuse, also
safeguards your system from viruses
1) Protects system against viruses, worms, spyware and
other unwanted programs .
2) Protection against data from theft.
3) Protects the computer from being hacked.
4) Minimized computer freezing and crashes.
5) Gives privacy to users.
6) Protecting company data and information.
Cyber Crime in India has been evolving rapidly. The
information technology act 2000 passed by the
parliament of India in may 2000, had aimed to curb
Cyber Crimes and to provide a legal framework for e-
commerce transactions . In 2001, India and united
states had set up an India-US Cyber Security forum as
part of a counter-terrorism dialogue. Cyber Crime
cases in India, registered under the IT act, increased at
a rate of 300%b between 2011 and 2014. in 2015, there
were 11,592 cases of Cyber Crime registered in India…..
 Awareness is the first step in protecting yourself, your
family and your business.
 Keep your operating system up to date with critical security
and updates and patches.
 Don’t open e-mails or attachments from unknown sources.
 Read privacy policy carefully when you submit the data
through internet.
 Use hard to guess passwords.
 Back-up your computer data on disks and CDs often.
 Use antivirus software and firewalls-keep them up to date.
 Technology is destructive only in the hands of people
who do not realize that are one and the same process
as the universe.
 As internet continues to develop, the potential for
computer related crime will grow.
 Future of crime control, may involve the control of
computer crime.
 Cyber Crime greatly affects individuals, businesses and
national security due to the pervasiveness of the
internet.
 Cyber Crime is a scary concept for many reasons. It can
do possible serious damage.
I WOULD LIKE TO MENTION SOME SOURCES
WHICH PROUD TO BE HELPFUL IN MAKING THIS
PRESENTATION ARE AS FOLLOW:
 www.google.com
 www.wikipedia.com
 www.google images
 www.youtube.com

More Related Content

Similar to cybercrime.pptx

Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
Waheed Rana
 

Similar to cybercrime.pptx (20)

Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Unit 1
Unit 1Unit 1
Unit 1
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 

Recently uploaded

Recently uploaded (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

cybercrime.pptx

  • 1. SUBMITTED TO:MRS. SUMANDEEP KAUR SUBMITTED BY: MISS. HIMANSHI : MISS. KIRANDEEP KAUR :MR. JOBANPREET SINGH
  • 2.  History of Cyber Crime.  Introduction of Cyber Crime.  Categories of Cyber Crime.  Types of Cyber Crime.  Cyber Security.  Benefits of Cyber Security.  Cyber Crime in India.  How to prevent Cyber Crime.  Conclusion.  Bibliography.
  • 3. The First Cyber Crime Recorded in late 1820. yes, it’s a shocking fact!!! Abacus, which is thought to be the earliest form of a computer ,has been around since 3500 B.C. in India, Japan and China. Joseph-Marie Jacquard , a textile manufacturer in France , produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard’s employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded Cyber Crime!!
  • 4.  CYBER CRIME is also known as COMPUTER- ORIENTED CRIME.  Cybercrimes can be defined as: “offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim”.  Cybercrime may threaten a person or a nation’s security and financial health.  Issues surroundings these types of crimes have become high-Profile, Particularly those surroundings hacking, copyright infringement and child grooming.
  • 5. Cyber Crimes are broadly categorized into three categories, namely crime against 1) INDIVIDUAL: This type of crime can be in the form of Cyber Stalking, Distributing Pornography, Trafficking and “Grooming”. 2) PROPERTY: In this type of cyber crime, they can steel a person’s bank details, misuse the credit card, or disrupt the system of the organization. 3) GOVERNMENT: Although not as common as the other two categories, crimes against a government are referred to as cyber terrorism. In this category, criminals hack government websites, military websites or circulate propaganda.
  • 6.  Fraud  Hacking  Identity Theft  Scamming  Computer Viruses  Spamming  Phishing  Social Engineering  Software Piracy  Child Pornograph
  • 7. Cyber Security is the protection of computer systems from theft of or damage to their hardware, software or electronic data , as well as from disruption or misdirection of the service they provide. Cyber Security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses
  • 8. 1) Protects system against viruses, worms, spyware and other unwanted programs . 2) Protection against data from theft. 3) Protects the computer from being hacked. 4) Minimized computer freezing and crashes. 5) Gives privacy to users. 6) Protecting company data and information.
  • 9. Cyber Crime in India has been evolving rapidly. The information technology act 2000 passed by the parliament of India in may 2000, had aimed to curb Cyber Crimes and to provide a legal framework for e- commerce transactions . In 2001, India and united states had set up an India-US Cyber Security forum as part of a counter-terrorism dialogue. Cyber Crime cases in India, registered under the IT act, increased at a rate of 300%b between 2011 and 2014. in 2015, there were 11,592 cases of Cyber Crime registered in India…..
  • 10.  Awareness is the first step in protecting yourself, your family and your business.  Keep your operating system up to date with critical security and updates and patches.  Don’t open e-mails or attachments from unknown sources.  Read privacy policy carefully when you submit the data through internet.  Use hard to guess passwords.  Back-up your computer data on disks and CDs often.  Use antivirus software and firewalls-keep them up to date.
  • 11.  Technology is destructive only in the hands of people who do not realize that are one and the same process as the universe.  As internet continues to develop, the potential for computer related crime will grow.  Future of crime control, may involve the control of computer crime.  Cyber Crime greatly affects individuals, businesses and national security due to the pervasiveness of the internet.  Cyber Crime is a scary concept for many reasons. It can do possible serious damage.
  • 12. I WOULD LIKE TO MENTION SOME SOURCES WHICH PROUD TO BE HELPFUL IN MAKING THIS PRESENTATION ARE AS FOLLOW:  www.google.com  www.wikipedia.com  www.google images  www.youtube.com