SlideShare a Scribd company logo
1
© AIR LAW ACADEMY & RESEARCH CENTRE,
NAGPUR
Email has fast emerged as the world's most
preferred form of communication. Billions of
email messages traverse the globe daily. Like
any other form of communication, email is also
misused by criminal elements. The ease, speed
and relative anonymity of email has made it a
powerful tool for criminals.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
2
 Email frauds
 Email spoofing
 Sending malicious codes through email
 Email bombing
 Sending threatening emails
 Defamatory emails
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 3
Email frauds are very often used to commit
financial crimes. It becomes a simple thing not
just to assume someone else's identity but
also to hide one's own. The person committing
the crime understands that there is very little
chance of his actually being identified.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
4
A spoofed email is one that appears to originate
from one source but has actually emerged from
another source. Falsifying the name and email
address of the originator of the email usually
does email spoofing.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 5
Emails are often the fastest and easiest ways to
propagate malicious code over the Internet.
Hackers often bind Trojans, viruses, worms and
other computer contaminants with e-greeting
cards and then email them to unsuspecting
persons. Such contaminants can also be bound
with software that appears to be an anti-virus
patch.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 6
 Email bombing refers to sending a large
amount of emails to the victim resulting in the
victim's email account or servers crashing.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 7
Email is a useful tool for technology savvy
criminals thanks to the relative anonymity
offered by it. It becomes fairly easy for anyone
with even a basic knowledge of computers to
become a blackmailer by threatening someone
via e-mail.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 8
Cyber-defamation or even cyber-slander as it
is called can prove to be very harmful and
even fatal to the people who have been made
its victims.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 9

More Related Content

What's hot

Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
AniketPandit18
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
Cut 2 Shreds
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
Harshita Ved
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
Shreeraj Nair
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
nikshaikh786
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
DINESH KAMBLE
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
Onkar1431
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
vishalgohel12195
 

What's hot (20)

Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Viewers also liked

Perseguição e honra de deus
Perseguição e honra de deusPerseguição e honra de deus
Perseguição e honra de deus
Rodrigo Mendonça
 
Eurostat déficit public
Eurostat déficit publicEurostat déficit public
Eurostat déficit public
Mame Mariéme Traoré
 
Nzcom writing for the journal.pptx with sound
Nzcom writing for the journal.pptx with soundNzcom writing for the journal.pptx with sound
Nzcom writing for the journal.pptx with sound
NZCollegeofMidwives
 
Is PMP Certification Worth Getting?
Is PMP Certification Worth Getting?Is PMP Certification Worth Getting?
Is PMP Certification Worth Getting?
Cognixia
 
Teleasistencia
TeleasistenciaTeleasistencia
Teleasistencia
Centro De Enseñanza
 
25 websites/blogs for your photography inspiration
25 websites/blogs for your photography inspiration25 websites/blogs for your photography inspiration
25 websites/blogs for your photography inspiration
Sinca Beni
 
IDCC 218 Pa relatif au temps partiel dérogatoire
IDCC 218 Pa relatif au temps partiel dérogatoireIDCC 218 Pa relatif au temps partiel dérogatoire
IDCC 218 Pa relatif au temps partiel dérogatoire
Mame Mariéme Traoré
 
Chinh sach quang cao nganh tham my - Facebook Support
Chinh sach quang cao nganh tham my - Facebook SupportChinh sach quang cao nganh tham my - Facebook Support
Chinh sach quang cao nganh tham my - Facebook Support
hoanghuydigital
 
Eurostat exportations de biens
Eurostat exportations de biensEurostat exportations de biens
Eurostat exportations de biens
Société Tripalio
 
Applying a public policy lens to environmental decision making
Applying a public policy lens to environmental decision makingApplying a public policy lens to environmental decision making
Applying a public policy lens to environmental decision making
Megan Evans
 
Bibblio - Distribution to Discovery
Bibblio - Distribution to DiscoveryBibblio - Distribution to Discovery
Bibblio - Distribution to Discovery
Mads Holmen
 
179D Tax Deduction PowerPoint Show 2016
179D Tax Deduction PowerPoint Show  2016179D Tax Deduction PowerPoint Show  2016
179D Tax Deduction PowerPoint Show 2016
SchultzEnergyConsulting
 
5 aula 11 esparta e atenas
5   aula 11 esparta e atenas5   aula 11 esparta e atenas
5 aula 11 esparta e atenasprofdu
 

Viewers also liked (14)

Perseguição e honra de deus
Perseguição e honra de deusPerseguição e honra de deus
Perseguição e honra de deus
 
Eurostat déficit public
Eurostat déficit publicEurostat déficit public
Eurostat déficit public
 
Nzcom writing for the journal.pptx with sound
Nzcom writing for the journal.pptx with soundNzcom writing for the journal.pptx with sound
Nzcom writing for the journal.pptx with sound
 
Is PMP Certification Worth Getting?
Is PMP Certification Worth Getting?Is PMP Certification Worth Getting?
Is PMP Certification Worth Getting?
 
EL Complete Group Presentation
EL Complete Group PresentationEL Complete Group Presentation
EL Complete Group Presentation
 
Teleasistencia
TeleasistenciaTeleasistencia
Teleasistencia
 
25 websites/blogs for your photography inspiration
25 websites/blogs for your photography inspiration25 websites/blogs for your photography inspiration
25 websites/blogs for your photography inspiration
 
IDCC 218 Pa relatif au temps partiel dérogatoire
IDCC 218 Pa relatif au temps partiel dérogatoireIDCC 218 Pa relatif au temps partiel dérogatoire
IDCC 218 Pa relatif au temps partiel dérogatoire
 
Chinh sach quang cao nganh tham my - Facebook Support
Chinh sach quang cao nganh tham my - Facebook SupportChinh sach quang cao nganh tham my - Facebook Support
Chinh sach quang cao nganh tham my - Facebook Support
 
Eurostat exportations de biens
Eurostat exportations de biensEurostat exportations de biens
Eurostat exportations de biens
 
Applying a public policy lens to environmental decision making
Applying a public policy lens to environmental decision makingApplying a public policy lens to environmental decision making
Applying a public policy lens to environmental decision making
 
Bibblio - Distribution to Discovery
Bibblio - Distribution to DiscoveryBibblio - Distribution to Discovery
Bibblio - Distribution to Discovery
 
179D Tax Deduction PowerPoint Show 2016
179D Tax Deduction PowerPoint Show  2016179D Tax Deduction PowerPoint Show  2016
179D Tax Deduction PowerPoint Show 2016
 
5 aula 11 esparta e atenas
5   aula 11 esparta e atenas5   aula 11 esparta e atenas
5 aula 11 esparta e atenas
 

Similar to Email crime ppt

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
edrianrheine
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
ssuser64f8f8
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
ErrorError22
 
Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques
EyesOpen Association
 
Spam
SpamSpam
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
Seth Reyes
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
Johnlery Guzman
 
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxBest e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
ikirkton
 
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxBest e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
AASTHA76
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
jonadhe mondeja
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
NimishaRawat
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
RapidSSLOnline.com
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
lesteraporado16
 
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
Shyam Pareek
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Sukhdev48
 

Similar to Email crime ppt (20)

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques
 
Spam
SpamSpam
Spam
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxBest e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
 
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxBest e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
Stalking2
Stalking2Stalking2
Stalking2
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
internet security
internet securityinternet security
internet security
 

Recently uploaded

NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
Cold War - 1, talks about cold water bro
Cold War - 1, talks about cold water broCold War - 1, talks about cold water bro
Cold War - 1, talks about cold water bro
SidharthKashyap5
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
shweeta209
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
patrons legal
 
Introducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdfIntroducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdf
AHRP Law Firm
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
Purushottam Jha
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 

Recently uploaded (20)

NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
Cold War - 1, talks about cold water bro
Cold War - 1, talks about cold water broCold War - 1, talks about cold water bro
Cold War - 1, talks about cold water bro
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
Introducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdfIntroducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdf
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 

Email crime ppt

  • 1. 1 © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 2. Email has fast emerged as the world's most preferred form of communication. Billions of email messages traverse the globe daily. Like any other form of communication, email is also misused by criminal elements. The ease, speed and relative anonymity of email has made it a powerful tool for criminals. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 2
  • 3.  Email frauds  Email spoofing  Sending malicious codes through email  Email bombing  Sending threatening emails  Defamatory emails © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 3
  • 4. Email frauds are very often used to commit financial crimes. It becomes a simple thing not just to assume someone else's identity but also to hide one's own. The person committing the crime understands that there is very little chance of his actually being identified. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 4
  • 5. A spoofed email is one that appears to originate from one source but has actually emerged from another source. Falsifying the name and email address of the originator of the email usually does email spoofing. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 5
  • 6. Emails are often the fastest and easiest ways to propagate malicious code over the Internet. Hackers often bind Trojans, viruses, worms and other computer contaminants with e-greeting cards and then email them to unsuspecting persons. Such contaminants can also be bound with software that appears to be an anti-virus patch. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 6
  • 7.  Email bombing refers to sending a large amount of emails to the victim resulting in the victim's email account or servers crashing. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 7
  • 8. Email is a useful tool for technology savvy criminals thanks to the relative anonymity offered by it. It becomes fairly easy for anyone with even a basic knowledge of computers to become a blackmailer by threatening someone via e-mail. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 8
  • 9. Cyber-defamation or even cyber-slander as it is called can prove to be very harmful and even fatal to the people who have been made its victims. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 9