1. CYBER CRIME AND MONEY
LAUNDERING
If we can defeat them sitting at
home……who needs to fight with tanks and
guns!!!!
Presented By
2.
3. The internet in India is growing rapidly. It has given rise
to new opportunities in every field we can think of it
entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own
disadvantages is Cyber crime- illegal activity committed
on the internet.
INTERNET INTRODUCTION
6. INTRODUCTION
Cyber crime is an
activity done using
computers and internet.
We can say that it is an
unlawful acts wherein the
computer either a tool or
target or both.
7. • The first recorded cyber crime took place in
1820.
• In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
• The first spam email took place in 1976 when it
was sent out over the ARPANET.
• The first virus was installed on an Apple
computer in 1982.
8.
9. We can categorize cyber crime in two ways.
• The computer as a target :- using a computer to
attacks other computer, e.g. Hacking,
virus/worms attacks, Dos attack etc.
• The computer as a weapon :- using a computer
to commit real world crime e.g. cyber terrorism,
credit card fraud and pornography etc.
10.
11. Hacking in simple terms
means an illegal intrusion
into a computer system or
network. It is also known as
CRACKING. Eg. Government
websites are the hot
targets of the hackers due
to the press coverage, it
receives. Hackers enjoy the
media coverage.
12. • Act by the criminal, who floods the bandwidth
of the victims network.
• Is his e-mail box with spam mail depriving him
of the services.
13. Malicious software that attaches itself to other
software or computer system and then propagates
itself to other computers via networks or disks.
(virus, worms, Trojan Horse, web jacking, e-mail
bombing etc)
14. • Damaging or destroying data rather than
stealing or misusing them is called cyber
vandalism. Transmitting virus: These are
programs that attach themselves to a file and
then circulate .
15. Terrorist attacks on the Internet is by distributed denial of
service attacks, hate websites and hate emails, attacks on
sensitive computer networks, etc. Technology savvy terrorists
are using 512-bit encryption, which is impossible to decrypt.
Ex. 26-11-2010
16. Theft of software through the illegal copying of
genuine programs or the counterfeiting and distribution
of products intended to pass for the original.
17. Phishing is just one of the many frauds on the Internet,
trying to fool people into parting with their money. Phishing
refers to the receipt of unsolicited emails by customers of
Financial Institutions
requesting them to
enter their Username
Password or other
personal information
to access their Account
for some reason.
18. The Internet is being highly used by its abusers to
reach and abuse children sexually, worldwide. As
more homes have access to internet, more children
would be using the internet and more are the
chances of falling victim to the aggression of
Pedophiles.
21. WHAT IS MONEY LAUNDERING?
Money laundering is the generic
process used to describe the
process by which criminals
disguise the original ownership
and control of the proceeds of
criminal conduct by making such
proceeds appeared to have
arrived from legitimate sources.
22. Stages Of Money Laundering
Stage 1 Placement: Where criminally derived funds
are introduced in the financial system
Stage 2 Layering: Where property ownership and
source of funds are disguised
Stage 3 integration : Laundered property becomes
legitimate
23. Consequences Of Money Laundering
• Increase In Crime And Corruption
• Weak Financial
Institutions
•Loss Of National
Reputation
•Economical Harm And
Detriment
24. Evasion Of Tax And Money Laundering
Tax evaders
launder their
money so they can
lie about where
the money and
assets have come
from
25. Money laundering has a very negative impact on the
Indian economy as well as the global economy in
terms of loss of funds, reputation and global ranking.
Impact Of Money Laundering
26. CONCLUSION
Each and every person uses internet and we feel we are
safe enough to use it. We don’t have to put much effort for
that. But criminal are there keeping eyes on your data.
So Always Try To Be Safe And Secure!!!
Reference :- www.google.com, Vipul Publication SY (A&F).