SlideShare a Scribd company logo
CRIME
crime: An a ction that constitutes
an ‘Offence’ which is punishable
by law
Cyber crime
Cyber crime encompasses any criminal act
dealing with computers and networks,
additionally it also includes traditional
crimes conducted through internet.
What actually Cyber Crime
includes?
Indentity theft and invasion of
piracy
Financial extortion
Wire fraud
Child pornography
Cyber terrorism
Hacking
Spams,creating phishing malwares
Cyber stalking
Indentity Theft
Personal info stolen that can
include persons Name, Social
Security Number, Birth date,Credit
card numbers, Accounts and Driving
lisence etc..
Financial Extortion
o ATM FRAUD:
It refers to fraud with the use of an
ATM card whereby the perpetrator of the
CRIME uses the card to immediately
withdraw funds from a consumer account
using pin based transactions at the ATM
WIRE FRAUD
Financial fraud involving the
use of telecommunication or
infromation technology
Child Pornography
Making or distributing child pornography
Cyber Terrorism
It includes hacking, threats,
blackmailing, towards a business
or person
Hacking
Hacking is unauthorized intrusion into
a computer or a network
The person engaged in hacking
activities is generally reffered to as a
hacker
“SEE WHO VIEWED UR PROFILE”
“CONFIRM UR E-MAIL ACCOUNT”
“FACEBOOK WILL CHARGE MEMBERS”
SPAM: spam involves sending
nearly identical messages to
thousands[or millions] of recipients
Creating malwares and viruses:
EX:“RANSOMWARE”
CYBER SECURITY
CONCLUSION
?
BEWARE
The gratest crimes do not arise from a
want of feeling for others but from an
over sensibility for ourselves and an
over indulgence In our own desires
Emp...err
Emp...err

More Related Content

What's hot

Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
blogzilla
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
VidaB
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
little robie
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
Aparajeeta Salu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aamir Malik
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
Identity theft
Identity theftIdentity theft
Identity theft
SARASWATHI S
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
Dixita S
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Johann Lo
 
Cyber security
Cyber security Cyber security
Cyber security
REVA UNIVERSITY
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
ICFAI Business School
 
Phishing
PhishingPhishing
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
Harold Stallard
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
Avishek Datta
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
Fairfax County
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
Radiant Minds
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
Rajveer Choudhary
 
Keep your office secure
Keep your office secureKeep your office secure
Keep your office secure
Konica Minolta
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
jasonsirmon
 

What's hot (20)

Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber security
Cyber security Cyber security
Cyber security
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
Phishing
PhishingPhishing
Phishing
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Keep your office secure
Keep your office secureKeep your office secure
Keep your office secure
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 

Similar to Emp...err

Cyberlaw
CyberlawCyberlaw
Cyberlaw
ambadesuhas
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber_Crime[1][1].pptx
Cyber_Crime[1][1].pptxCyber_Crime[1][1].pptx
Cyber_Crime[1][1].pptx
MohitMaurya57
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
Aalbert Albert
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
silas Sargunam
 
Module vi mis
Module vi misModule vi mis
Module vi mis
Arnav Chowdhury
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
srishtig993
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rahul Reddy
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Zeeshan Masood S
 
cybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.pptcybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.ppt
SIRINET2
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
KrishnaGupta769783
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Rakesh Sahani
 
cybercrimeppt-1209241214217-phpapp01.ppt
cybercrimeppt-1209241214217-phpapp01.pptcybercrimeppt-1209241214217-phpapp01.ppt
cybercrimeppt-1209241214217-phpapp01.ppt
SIRINET2
 
Unit 1
Unit 1Unit 1
Unit 1
Jigarthacker
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
sunanditaAnand
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
Deepak Kumar (D3)
 

Similar to Emp...err (20)

Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber_Crime[1][1].pptx
Cyber_Crime[1][1].pptxCyber_Crime[1][1].pptx
Cyber_Crime[1][1].pptx
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
cybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.pptcybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.ppt
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cybercrimeppt-1209241214217-phpapp01.ppt
cybercrimeppt-1209241214217-phpapp01.pptcybercrimeppt-1209241214217-phpapp01.ppt
cybercrimeppt-1209241214217-phpapp01.ppt
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 

Recently uploaded

Iconic Logix | Best Digital Marketing Agency For Iconic Success
Iconic Logix | Best Digital Marketing Agency For Iconic SuccessIconic Logix | Best Digital Marketing Agency For Iconic Success
Iconic Logix | Best Digital Marketing Agency For Iconic Success
iconictecnologies
 
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
9u4xjk4w
 
Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........
SocioCosmos
 
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
anubug
 
Factors affecting undergraduate students’ motivation at a university in Tra Vinh
Factors affecting undergraduate students’ motivation at a university in Tra VinhFactors affecting undergraduate students’ motivation at a university in Tra Vinh
Factors affecting undergraduate students’ motivation at a university in Tra Vinh
AJHSSR Journal
 
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...
AJHSSR Journal
 
SOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and serviceSOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and service
viralbusinessmarketi
 
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
AJHSSR Journal
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
AJHSSR Journal
 
Top Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's PerformanceTop Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's Performance
Elysian Digital Services Pvt. Ltd.
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
urbhattiacademy
 
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMSTUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
AJHSSR Journal
 
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...
AJHSSR Journal
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
Charles Bayless
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
7lkkjxt
 

Recently uploaded (15)

Iconic Logix | Best Digital Marketing Agency For Iconic Success
Iconic Logix | Best Digital Marketing Agency For Iconic SuccessIconic Logix | Best Digital Marketing Agency For Iconic Success
Iconic Logix | Best Digital Marketing Agency For Iconic Success
 
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
 
Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........
 
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
 
Factors affecting undergraduate students’ motivation at a university in Tra Vinh
Factors affecting undergraduate students’ motivation at a university in Tra VinhFactors affecting undergraduate students’ motivation at a university in Tra Vinh
Factors affecting undergraduate students’ motivation at a university in Tra Vinh
 
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...
 
SOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and serviceSOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and service
 
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
 
Top Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's PerformanceTop Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's Performance
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
 
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMSTUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
 
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
 

Emp...err

  • 1.
  • 2. CRIME crime: An a ction that constitutes an ‘Offence’ which is punishable by law
  • 3. Cyber crime Cyber crime encompasses any criminal act dealing with computers and networks, additionally it also includes traditional crimes conducted through internet.
  • 4. What actually Cyber Crime includes? Indentity theft and invasion of piracy Financial extortion Wire fraud Child pornography Cyber terrorism Hacking Spams,creating phishing malwares Cyber stalking
  • 5. Indentity Theft Personal info stolen that can include persons Name, Social Security Number, Birth date,Credit card numbers, Accounts and Driving lisence etc..
  • 6. Financial Extortion o ATM FRAUD: It refers to fraud with the use of an ATM card whereby the perpetrator of the CRIME uses the card to immediately withdraw funds from a consumer account using pin based transactions at the ATM
  • 7. WIRE FRAUD Financial fraud involving the use of telecommunication or infromation technology
  • 8. Child Pornography Making or distributing child pornography
  • 9. Cyber Terrorism It includes hacking, threats, blackmailing, towards a business or person
  • 10.
  • 11.
  • 12. Hacking Hacking is unauthorized intrusion into a computer or a network The person engaged in hacking activities is generally reffered to as a hacker “SEE WHO VIEWED UR PROFILE” “CONFIRM UR E-MAIL ACCOUNT” “FACEBOOK WILL CHARGE MEMBERS”
  • 13.
  • 14. SPAM: spam involves sending nearly identical messages to thousands[or millions] of recipients Creating malwares and viruses: EX:“RANSOMWARE”
  • 15.
  • 17.
  • 18.
  • 21. The gratest crimes do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence In our own desires