SlideShare a Scribd company logo
A PRESENTATION ON CYBER
CRIME
PREPARED BY:-
Devanshi Solanki
Om Patel
content
 What is Cyber Crime?
 Types of Cyber Crime.
 Classification of Cyber Crime.
 How to solve cyber crime?
What is Cyber crime?
■ Cyber crime is simply defined as crimes that are directly related
to computer using computer.
■ An increasing number of domestic and international criminal
activities are using the INTERNET.
■ Computers and other electronic devices are tools for criminal to
commit crime.
■ A personal computer connected to the internet without protection
may be infected with cyber crime in one minute.
■ Cyber Crime is one of the fastest growing criminal activities on the
planet.
■ It covers a huge range of illegal activity including financial scams ,
computer hacking ,virus attacks and stalking by e-mail .
■ Cyber Crime has been used to describe wide range of crimes ,
including crimes against computer data and systems(such as
“Hacking”) , computer related forgery and fraud(such as “Phishing”)
etc.
TYPES OF CYBER CRIME
Types of cyber crime
Against Individuals
Against Individual
property
Against an
organization
Against
Government
 Terrorize
international
Govt.
 Cracking
into Military
maintained
website.
 Intellectual
Property
crime.
 Transmitting
Virus.
 Computer
vandalism.
 Cyber
terrorism
against the
government
organization.
 Possession
of
unauthorized
information.
 Email
Spoofing.
 Cheating &
fraud.
CLASSIFICATION OF CYBER CRIME
■ Cyber crimes are crime related to information technology, electronic,
commerce etc. Cyber crimes are increasing in all countries and they are
bound to explode new legal issues.
■ There are a variety of crimes committed on the Internet but some of them
are:
1) Internet Fraud and financial crimes.
2) Spam E-mail.
3) Online Gambling
4) Phishing.
5) Hacking.
Internet Fraud and financial crimes
Money is the most common motive behind
all crime.
 Various Internet frauds include online auctions,
Internet access devices , travel/vacations, advance
fee loan, prizes etc. Payment method varies from
credit/debit card to cheque to even sending cash.
 Financial crimes Include cyber cheating, credit
card frauds, money laundering, hacking into bank
servers, computer manipulation, accounting
scams etc.
Phishing
 Phishing is a new kind of cybercrime and
method of committing online financial fraud.
 It tricks computer users into entering critical
and sensitive information in fake websites,
which is later used by them for identity theft
and swindling user bank accounts.
 The term "phishing" is derived from "fishing“
where bait is offered to fish
ONLINE GAMBLING
 Online gambling is any kind of gambling
conducted on the internet. This includes
virtual poker, casinos and sports betting.
 Online gambling involves huge volumes
of transactions and cash flows that can
obscure and disguise money laundering.
 Players are not dealing with a physical
currency does not change hands
 As a result, illegal proceeds can be lorded
by criminal and end of transaction and
receiving the payouts as gambling wins on
the other end.
Hacking
■ A hacker is someone who likes to tinker with electronic or
computer systems: finding ways to make them do what
they do better, or do things they weren’t intended to do.
■ Hackers are always everywhere ,nothing is secured these
days.
■ Cyber attacks are an attempt to destroy or infect computer
networks in order to extract or extort money or for other
malicious intentions such as procuring necessary
information.
■ Cyber attacks alter computer code, data or logic via
malicious code resulting in troublesome
SPAM E-MAIL
 Email spam is the electronic version
of junk mail.
 It involves sending unwanted
messages, often unsolicited
advertising to a large number of
recipients.
 Spam is a serious security concern
as it can used to deliver Trojan
horses , viruses , worms , spyware
and targeted phishing attacks.
HOW TO SOLVE CYBER CRIME?
■ Use a full-service internet security suite.
■ Use strong Password.
■ Kee your software upgrade.
■ Manage your social media settings.
■ Talk to your children about the internet.
■ Secure your wireless networks.
■ Practice safe shopping.
■ Practice safe surfing.
■ Uninstall unnecessary software.
■ Maintain Backup.
■ Learn more about Internet privacy.
THANK YOU

More Related Content

What's hot (20)

Cyberextortion
CyberextortionCyberextortion
Cyberextortion
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing
PhishingPhishing
Phishing
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Phishing
PhishingPhishing
Phishing
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Similar to Presentation on cyber crime

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeetaAparajeeta Salu
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 

Similar to Presentation on cyber crime (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Final ppt
Final pptFinal ppt
Final ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 

Recently uploaded

Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filosemadisonsmith478075
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategyDigital Marketing Lab
 
Social Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfklSocial Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfklmdigitalmarketing001
 
How to blow up on social media simple di
How to blow up on social media simple diHow to blow up on social media simple di
How to blow up on social media simple diRachaelOnuche
 
Experience genuine and sustainable growth on TikTok.
Experience genuine and sustainable growth on TikTok.Experience genuine and sustainable growth on TikTok.
Experience genuine and sustainable growth on TikTok.SocioCosmos
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptxlorraineandreiamcidl
 
Top 10 Best Motivational Movies Of Bollywood
Top 10 Best Motivational Movies Of BollywoodTop 10 Best Motivational Movies Of Bollywood
Top 10 Best Motivational Movies Of Bollywoodsingsanjib421
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...AJHSSR Journal
 
Grow Your Instagram Profile Organically A Guide to Real Engagement.pdf
Grow Your Instagram Profile Organically A Guide to Real Engagement.pdfGrow Your Instagram Profile Organically A Guide to Real Engagement.pdf
Grow Your Instagram Profile Organically A Guide to Real Engagement.pdfSocioCosmos
 
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm RiskNon-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm RiskAJHSSR Journal
 
Want to Amplify Your Pinterest Content?...
Want to Amplify Your Pinterest Content?...Want to Amplify Your Pinterest Content?...
Want to Amplify Your Pinterest Content?...SocioCosmos
 
Children's Data Privacy_April-22_2024.pdf
Children's Data Privacy_April-22_2024.pdfChildren's Data Privacy_April-22_2024.pdf
Children's Data Privacy_April-22_2024.pdfSiobhan O'Flynn
 
Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....SocioCosmos
 
Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...
Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...
Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...prithvikumar6695#S07
 
Looking to Drive Traffic from Pinterest?
Looking to Drive Traffic from Pinterest?Looking to Drive Traffic from Pinterest?
Looking to Drive Traffic from Pinterest?SocioCosmos
 
How social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdfHow social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdfpramodkumar2310
 

Recently uploaded (16)

Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
 
Social Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfklSocial Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfkl
 
How to blow up on social media simple di
How to blow up on social media simple diHow to blow up on social media simple di
How to blow up on social media simple di
 
Experience genuine and sustainable growth on TikTok.
Experience genuine and sustainable growth on TikTok.Experience genuine and sustainable growth on TikTok.
Experience genuine and sustainable growth on TikTok.
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
 
Top 10 Best Motivational Movies Of Bollywood
Top 10 Best Motivational Movies Of BollywoodTop 10 Best Motivational Movies Of Bollywood
Top 10 Best Motivational Movies Of Bollywood
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
 
Grow Your Instagram Profile Organically A Guide to Real Engagement.pdf
Grow Your Instagram Profile Organically A Guide to Real Engagement.pdfGrow Your Instagram Profile Organically A Guide to Real Engagement.pdf
Grow Your Instagram Profile Organically A Guide to Real Engagement.pdf
 
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm RiskNon-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
 
Want to Amplify Your Pinterest Content?...
Want to Amplify Your Pinterest Content?...Want to Amplify Your Pinterest Content?...
Want to Amplify Your Pinterest Content?...
 
Children's Data Privacy_April-22_2024.pdf
Children's Data Privacy_April-22_2024.pdfChildren's Data Privacy_April-22_2024.pdf
Children's Data Privacy_April-22_2024.pdf
 
Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....
 
Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...
Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...
Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...
 
Looking to Drive Traffic from Pinterest?
Looking to Drive Traffic from Pinterest?Looking to Drive Traffic from Pinterest?
Looking to Drive Traffic from Pinterest?
 
How social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdfHow social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdf
 

Presentation on cyber crime

  • 1. A PRESENTATION ON CYBER CRIME PREPARED BY:- Devanshi Solanki Om Patel
  • 2. content  What is Cyber Crime?  Types of Cyber Crime.  Classification of Cyber Crime.  How to solve cyber crime?
  • 3. What is Cyber crime? ■ Cyber crime is simply defined as crimes that are directly related to computer using computer. ■ An increasing number of domestic and international criminal activities are using the INTERNET. ■ Computers and other electronic devices are tools for criminal to commit crime.
  • 4. ■ A personal computer connected to the internet without protection may be infected with cyber crime in one minute. ■ Cyber Crime is one of the fastest growing criminal activities on the planet. ■ It covers a huge range of illegal activity including financial scams , computer hacking ,virus attacks and stalking by e-mail . ■ Cyber Crime has been used to describe wide range of crimes , including crimes against computer data and systems(such as “Hacking”) , computer related forgery and fraud(such as “Phishing”) etc.
  • 5. TYPES OF CYBER CRIME Types of cyber crime Against Individuals Against Individual property Against an organization Against Government  Terrorize international Govt.  Cracking into Military maintained website.  Intellectual Property crime.  Transmitting Virus.  Computer vandalism.  Cyber terrorism against the government organization.  Possession of unauthorized information.  Email Spoofing.  Cheating & fraud.
  • 6. CLASSIFICATION OF CYBER CRIME ■ Cyber crimes are crime related to information technology, electronic, commerce etc. Cyber crimes are increasing in all countries and they are bound to explode new legal issues. ■ There are a variety of crimes committed on the Internet but some of them are: 1) Internet Fraud and financial crimes. 2) Spam E-mail. 3) Online Gambling 4) Phishing. 5) Hacking.
  • 7. Internet Fraud and financial crimes Money is the most common motive behind all crime.  Various Internet frauds include online auctions, Internet access devices , travel/vacations, advance fee loan, prizes etc. Payment method varies from credit/debit card to cheque to even sending cash.  Financial crimes Include cyber cheating, credit card frauds, money laundering, hacking into bank servers, computer manipulation, accounting scams etc.
  • 8. Phishing  Phishing is a new kind of cybercrime and method of committing online financial fraud.  It tricks computer users into entering critical and sensitive information in fake websites, which is later used by them for identity theft and swindling user bank accounts.  The term "phishing" is derived from "fishing“ where bait is offered to fish
  • 9. ONLINE GAMBLING  Online gambling is any kind of gambling conducted on the internet. This includes virtual poker, casinos and sports betting.  Online gambling involves huge volumes of transactions and cash flows that can obscure and disguise money laundering.  Players are not dealing with a physical currency does not change hands  As a result, illegal proceeds can be lorded by criminal and end of transaction and receiving the payouts as gambling wins on the other end.
  • 10. Hacking ■ A hacker is someone who likes to tinker with electronic or computer systems: finding ways to make them do what they do better, or do things they weren’t intended to do. ■ Hackers are always everywhere ,nothing is secured these days. ■ Cyber attacks are an attempt to destroy or infect computer networks in order to extract or extort money or for other malicious intentions such as procuring necessary information. ■ Cyber attacks alter computer code, data or logic via malicious code resulting in troublesome
  • 11. SPAM E-MAIL  Email spam is the electronic version of junk mail.  It involves sending unwanted messages, often unsolicited advertising to a large number of recipients.  Spam is a serious security concern as it can used to deliver Trojan horses , viruses , worms , spyware and targeted phishing attacks.
  • 12. HOW TO SOLVE CYBER CRIME? ■ Use a full-service internet security suite. ■ Use strong Password. ■ Kee your software upgrade. ■ Manage your social media settings. ■ Talk to your children about the internet. ■ Secure your wireless networks. ■ Practice safe shopping. ■ Practice safe surfing. ■ Uninstall unnecessary software. ■ Maintain Backup. ■ Learn more about Internet privacy.