SlideShare a Scribd company logo
1
Cybercrime is nothing but where the computer used
as an object or subject of crime.
Cyber crime is an evil having its origin in the growing
dependence on computers in modern life. In a day and
age when everything from microwave ovens and
refrigerators to nuclear power plants is being run on
computers, cyber crime has assumed rather sinister
implications.
Crime committed using a computer and the internet
to steal a person's identity or illegal imports or
malicious programs
2 2
In the early decades of modern information technology (IT),
computer crimes were largely committed by individual disgruntled
and dishonest employees.
Physical damage to computer systems was a prominent threat
until the 1980s.
Programmers in the 1980s began writing malicious software,
including self-replicating programs, to interfere with personal
computers.
As the Internet increased access to increasing numbers of
systems worldwide, criminals used unauthorized access to poorly
protected systems for vandalism, political action and financial
gain.
3 3
Criminal activity involving
Information technology
infrastructure
 Illegal access
 Data interference
 Misuse of devices
 Forgery and
 Electronic fraud.
4 4
Types of Cyber Crime
Hacking - Hacking in simple terms means an illegal
intrusion into a computer system without permission of
computer owner/user. Hackers write or use ready-made
computer programs to attack the target computer.
Software Piracy - Theft of software through the illegal
copying of genuine programs or the counterfeiting and
distribution of products intended to pass for the
original. The unauthorized copying of software.
5
Email spoofing - A spoofed email is one that appears to
originate from one source but actually has been sent
from another source.
Phishing - The e-mail directs the user to visit a Web site
where they ar asked to update personal information,
such as passwords and credit card social security, and
bank account numbers, that the legitimat organization
already has .
6
7
CLASSIFICATION
8
 Against Individuals
 Against Organization
 Against Society
 Harassment via e-mails
 Email spoofing
Defamation. Unauthorized control/access
over computer system
 Cheating & Fraud
 Phishing
9 9
Unauthorized control/access over computer
system.
Possession of unauthorized information.
Cyber terrorism against the government
organization.
Distribution of pirated software etc.
10 1
12
Polluting the youth
through indecent
exposure.
 Trafficking
 Financial crimes
 Sale of illegal articles
 Online gambling
 Forgery
1
1
13
1
PREVENTION OF CYBER
CRIME
14
 Anti-virus software .
 Frequent password changing.
 Firewalls.
 Safe surfing.
 Frequent virus checks.
 Email filters.
1
 User awareness is key to a secure computer/network
 Do not open suspicious files/emails
 Avoid using P2P programs
 Avoid downloading freeware
If attacked, disconnect the network. Do not turn off the
computer
So we must pay attention to all those issues and protect the
World from Cyber Crime
“If you spend more on coffee than on IT security, you
will be hacked. What’s more, you deserve to be hacked.
— White House Cybersecurity Advisor” ─ Richard
Clarke
15
1
16
1

More Related Content

Similar to CYBER.pptx

Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Fit Tri
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Computer crime
Computer crimeComputer crime
Computer crime
Vishesh Dalal
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Accenture
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
Anjana Ks
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rahul Reddy
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
Jody Sullivan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
sunanditaAnand
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
kirtigoyal328
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
Hussain777
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
OmprakashRaut
 

Similar to CYBER.pptx (20)

Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 

More from hichamelhirch

formation_dockerhscv jh sjsjx jhxavcjhvdcjhvajhsdvc
formation_dockerhscv jh   sjsjx jhxavcjhvdcjhvajhsdvcformation_dockerhscv jh   sjsjx jhxavcjhvdcjhvajhsdvc
formation_dockerhscv jh sjsjx jhxavcjhvdcjhvajhsdvc
hichamelhirch
 
PPT PFE.pptx
PPT PFE.pptxPPT PFE.pptx
PPT PFE.pptx
hichamelhirch
 
fffffff.pptx
fffffff.pptxfffffff.pptx
fffffff.pptx
hichamelhirch
 
kakaka.pptx
kakaka.pptxkakaka.pptx
kakaka.pptx
hichamelhirch
 
chp1_Introduction gnerale.pptx
chp1_Introduction gnerale.pptxchp1_Introduction gnerale.pptx
chp1_Introduction gnerale.pptx
hichamelhirch
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
hichamelhirch
 
CYBER2000.pptx
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
hichamelhirch
 
Leader20000.pptx
Leader20000.pptxLeader20000.pptx
Leader20000.pptx
hichamelhirch
 
asd123.pptx
asd123.pptxasd123.pptx
asd123.pptx
hichamelhirch
 
Gestion budgetaire.pptx
Gestion budgetaire.pptxGestion budgetaire.pptx
Gestion budgetaire.pptx
hichamelhirch
 
kkkkkkkkkkk.pptx
kkkkkkkkkkk.pptxkkkkkkkkkkk.pptx
kkkkkkkkkkk.pptx
hichamelhirch
 
LeaderF2.pptx
LeaderF2.pptxLeaderF2.pptx
LeaderF2.pptx
hichamelhirch
 
LeaderF1.pptx
LeaderF1.pptxLeaderF1.pptx
LeaderF1.pptx
hichamelhirch
 
LeaderF.pptx
LeaderF.pptxLeaderF.pptx
LeaderF.pptx
hichamelhirch
 

More from hichamelhirch (14)

formation_dockerhscv jh sjsjx jhxavcjhvdcjhvajhsdvc
formation_dockerhscv jh   sjsjx jhxavcjhvdcjhvajhsdvcformation_dockerhscv jh   sjsjx jhxavcjhvdcjhvajhsdvc
formation_dockerhscv jh sjsjx jhxavcjhvdcjhvajhsdvc
 
PPT PFE.pptx
PPT PFE.pptxPPT PFE.pptx
PPT PFE.pptx
 
fffffff.pptx
fffffff.pptxfffffff.pptx
fffffff.pptx
 
kakaka.pptx
kakaka.pptxkakaka.pptx
kakaka.pptx
 
chp1_Introduction gnerale.pptx
chp1_Introduction gnerale.pptxchp1_Introduction gnerale.pptx
chp1_Introduction gnerale.pptx
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 
CYBER2000.pptx
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
 
Leader20000.pptx
Leader20000.pptxLeader20000.pptx
Leader20000.pptx
 
asd123.pptx
asd123.pptxasd123.pptx
asd123.pptx
 
Gestion budgetaire.pptx
Gestion budgetaire.pptxGestion budgetaire.pptx
Gestion budgetaire.pptx
 
kkkkkkkkkkk.pptx
kkkkkkkkkkk.pptxkkkkkkkkkkk.pptx
kkkkkkkkkkk.pptx
 
LeaderF2.pptx
LeaderF2.pptxLeaderF2.pptx
LeaderF2.pptx
 
LeaderF1.pptx
LeaderF1.pptxLeaderF1.pptx
LeaderF1.pptx
 
LeaderF.pptx
LeaderF.pptxLeaderF.pptx
LeaderF.pptx
 

Recently uploaded

How HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdfHow HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdf
HumanResourceDimensi1
 
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Neil Horowitz
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
Operational Excellence Consulting
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Stone Art Hub
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
GraceKohler1
 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
➑➌➋➑➒➎➑➑➊➍
 
Negotiation & Presentation Skills regarding steps in business communication, ...
Negotiation & Presentation Skills regarding steps in business communication, ...Negotiation & Presentation Skills regarding steps in business communication, ...
Negotiation & Presentation Skills regarding steps in business communication, ...
UdayaShankarS1
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
sssourabhsharma
 
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
onlyfansmanagedau
 
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdfThe Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
thesiliconleaders
 

Recently uploaded (20)

How HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdfHow HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdf
 
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
 
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
 
Negotiation & Presentation Skills regarding steps in business communication, ...
Negotiation & Presentation Skills regarding steps in business communication, ...Negotiation & Presentation Skills regarding steps in business communication, ...
Negotiation & Presentation Skills regarding steps in business communication, ...
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
 
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
 
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdfThe Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
 

CYBER.pptx

  • 1. 1
  • 2. Cybercrime is nothing but where the computer used as an object or subject of crime. Cyber crime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications. Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs 2 2
  • 3. In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees. Physical damage to computer systems was a prominent threat until the 1980s. Programmers in the 1980s began writing malicious software, including self-replicating programs, to interfere with personal computers. As the Internet increased access to increasing numbers of systems worldwide, criminals used unauthorized access to poorly protected systems for vandalism, political action and financial gain. 3 3
  • 4. Criminal activity involving Information technology infrastructure  Illegal access  Data interference  Misuse of devices  Forgery and  Electronic fraud. 4 4
  • 5. Types of Cyber Crime Hacking - Hacking in simple terms means an illegal intrusion into a computer system without permission of computer owner/user. Hackers write or use ready-made computer programs to attack the target computer. Software Piracy - Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. The unauthorized copying of software. 5
  • 6. Email spoofing - A spoofed email is one that appears to originate from one source but actually has been sent from another source. Phishing - The e-mail directs the user to visit a Web site where they ar asked to update personal information, such as passwords and credit card social security, and bank account numbers, that the legitimat organization already has . 6
  • 7. 7
  • 8. CLASSIFICATION 8  Against Individuals  Against Organization  Against Society
  • 9.  Harassment via e-mails  Email spoofing Defamation. Unauthorized control/access over computer system  Cheating & Fraud  Phishing 9 9
  • 10. Unauthorized control/access over computer system. Possession of unauthorized information. Cyber terrorism against the government organization. Distribution of pirated software etc. 10 1
  • 11. 12 Polluting the youth through indecent exposure.  Trafficking  Financial crimes  Sale of illegal articles  Online gambling  Forgery 1
  • 12. 1
  • 13. 13 1
  • 14. PREVENTION OF CYBER CRIME 14  Anti-virus software .  Frequent password changing.  Firewalls.  Safe surfing.  Frequent virus checks.  Email filters. 1
  • 15.  User awareness is key to a secure computer/network  Do not open suspicious files/emails  Avoid using P2P programs  Avoid downloading freeware If attacked, disconnect the network. Do not turn off the computer So we must pay attention to all those issues and protect the World from Cyber Crime “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. — White House Cybersecurity Advisor” ─ Richard Clarke 15 1
  • 16. 16 1