SlideShare a Scribd company logo
CYBER CRIME
CONTENT:
WHAT IS CYBER CRIME?
WHAT IS CYBER CRIME?
• Cybercrime is criminal activity that either targets or uses a computer, a computer network or a
networked device. Most cybercrime is committed by cybercriminals or hackers who want to
make money.
• However, occasionally cybercrime aims to damage computers or networks for reasons other
than profit. These could be political or personal.
• Cybercrime can be carried out by individuals or organizations. Some cybercriminals are
organized, use advanced techniques and are highly technically skilled. Others are novice
hackers.
• Cybercrime is incredibly organized and professionalized.
HISTORY
• The first recorded cybercrime was recorded in the year 1820.
• The first spam email took place in 1978 when it was sent over the Arpanet.
• The first virus was installed on an Apple computer in 1982.
WHO ARE THEY?
• Most cybercrimes are committed by individuals or small groups.
However, large organized crime groups also take advantage of the internet.
• These 'professional' criminals find new ways to commit old crimes, treating
cybercrime like a business and forming global criminal communities.
• Criminal communities share strategies and tools and can combine forces to
launch coordinated attacks.
• They even have underground market place where cyber criminals can buy
and sell stolen information and identities.
ATTACK TECHNIQUES:
• BOTNET- a network of software robots, or bots ,that automatically spread malware.
• ZOMBIE COMPUTER- a computer that has been hacked into and is used to launch malicious
arracks or to become part of a botnet.
• DENIAL OF SERVICE attackes -flooding a network or server with traffic in order to make it
unavailable to its users.
• SKIMMERS- Devices that steal credit card information when the card is swiped threw them.
This can happen in stores or restaurants when the card is out the owner's view and frequently
the credit card information is then sold online through a criminal community.
List of Cybercrimes:
• 1. Child Pornography OR Child sexually abusive material (CSAM)
• Child sexually abusive material (CSAM) refers to a material containing sexual images in any form, of a child who is
abused or sexually exploited. Section 67 (B) of the IT Act states that “it is punishable for publishing or transmitting of
material depicting children in the sexually explicit act, etc. in electronic form.
• 2. Cyber Bullying
• A form of harassment or bullying inflicted through the use of electronic or communication devices such as computers,
mobile phones, laptops, etc.
• 3. Cyber Stalking
• Cyberstalking is the use of electronic communication by a person to follow a person, or attempts to contact a person to
foster personal interaction repeatedly despite a clear indication of disinterest by such person; or monitors the internet,
email or any other form of electronic communication commits the offence of stalking.
• 4. Online Job Fraud
• Online Job Fraud is an attempt to defraud people who are in need of employment by giving them false hope/
promise of better employment with higher wages.
List of Cybercrimes:
• 5. Phishing
• Phishing is a type of fraud that involves stealing personal information such as Customer ID, IPIN, Credit/Debit Card
number, Card expiry date, CVV number, etc. through emails that appear to be from a legitimate source.
• 6. Vishing
• Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net Banking password, ATM
PIN, OTP, Card expiry date, CVV etc. through a phone call.
• 7. Smishing
• Smishing is a type of fraud that uses mobile phone text messages to lure victims into calling back on a fraudulent phone
number, visiting fraudulent websites or downloading malicious content via phone or web.
• 8. Data Breach
• A data breach is an incident in which information is accessed without authorization.
TYPES OF CYBER ATTACK BY PERCENTAGE
• Financial fraud: 11%
• Sabotage of data/networks: 17%
• Theft of proprietary information: 20%
• System penetration from the outside: 25%
• Denial of service: 27%
• Unauthorized access by insiders: 71%
• Employee abuse of internet privileges: 79%
• Viruses: 85%
How to protect yourself against cybercrime
1.Ensure your system is up-to-date
2.Use a secure internet connection
3.Use a strong password
4.Be aware of pop-ups and fraudulent emails
5.Protect yourself from identity threats
6.Manage your social media settings
7.Get right cyber insurance policy
8.Avoid the urge to save passwords in your browser
9.Do not trust everything on THE INTERNET
CONCLUSION
• Technology is destructive only in the hands of people who do not realize that they are one and
the same process as the universe.

More Related Content

Similar to Presentation.pptx

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
DrPraveenKumar37
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
KajalSharma240
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in managementlily004
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
SEO2India - Devang Barot - SEO2India
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Jeet Swain
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
Talwant Singh
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb21
 
SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
pratikshapatil62556
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
Devanshi Solanki
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
Dr. Arun Verma
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
Navjyotsinh Jadeja
 

Similar to Presentation.pptx (20)

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in management
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 

More from Clichesin

01 Incoterms 2020.pptxdsgfhgjklkkjjhgfdsssdfg
01 Incoterms 2020.pptxdsgfhgjklkkjjhgfdsssdfg01 Incoterms 2020.pptxdsgfhgjklkkjjhgfdsssdfg
01 Incoterms 2020.pptxdsgfhgjklkkjjhgfdsssdfg
Clichesin
 
2. Various COO.pptx
2. Various COO.pptx2. Various COO.pptx
2. Various COO.pptx
Clichesin
 
1 IEC REV220919.pptx
1 IEC REV220919.pptx1 IEC REV220919.pptx
1 IEC REV220919.pptx
Clichesin
 
IM PPT 2 ....pptx
IM PPT 2 ....pptxIM PPT 2 ....pptx
IM PPT 2 ....pptx
Clichesin
 
polyethene-141204092607-conversion-gate01.pdf
polyethene-141204092607-conversion-gate01.pdfpolyethene-141204092607-conversion-gate01.pdf
polyethene-141204092607-conversion-gate01.pdf
Clichesin
 
polyethene-1.pptx
polyethene-1.pptxpolyethene-1.pptx
polyethene-1.pptx
Clichesin
 
ABHI INTERSHIP REPORT.pptx
ABHI INTERSHIP REPORT.pptxABHI INTERSHIP REPORT.pptx
ABHI INTERSHIP REPORT.pptx
Clichesin
 

More from Clichesin (7)

01 Incoterms 2020.pptxdsgfhgjklkkjjhgfdsssdfg
01 Incoterms 2020.pptxdsgfhgjklkkjjhgfdsssdfg01 Incoterms 2020.pptxdsgfhgjklkkjjhgfdsssdfg
01 Incoterms 2020.pptxdsgfhgjklkkjjhgfdsssdfg
 
2. Various COO.pptx
2. Various COO.pptx2. Various COO.pptx
2. Various COO.pptx
 
1 IEC REV220919.pptx
1 IEC REV220919.pptx1 IEC REV220919.pptx
1 IEC REV220919.pptx
 
IM PPT 2 ....pptx
IM PPT 2 ....pptxIM PPT 2 ....pptx
IM PPT 2 ....pptx
 
polyethene-141204092607-conversion-gate01.pdf
polyethene-141204092607-conversion-gate01.pdfpolyethene-141204092607-conversion-gate01.pdf
polyethene-141204092607-conversion-gate01.pdf
 
polyethene-1.pptx
polyethene-1.pptxpolyethene-1.pptx
polyethene-1.pptx
 
ABHI INTERSHIP REPORT.pptx
ABHI INTERSHIP REPORT.pptxABHI INTERSHIP REPORT.pptx
ABHI INTERSHIP REPORT.pptx
 

Recently uploaded

一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
h7j5io0
 
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
7sd8fier
 
Mohannad Abdullah portfolio _ V2 _22-24
Mohannad Abdullah  portfolio _ V2 _22-24Mohannad Abdullah  portfolio _ V2 _22-24
Mohannad Abdullah portfolio _ V2 _22-24
M. A. Architect
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
n0tivyq
 
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdfPORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
fabianavillanib
 
Book Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for DesignersBook Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for Designers
Confidence Ago
 
Portfolio.pdf
Portfolio.pdfPortfolio.pdf
Portfolio.pdf
garcese
 
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
smpc3nvg
 
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
9a93xvy
 
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
7sd8fier
 
Expert Accessory Dwelling Unit (ADU) Drafting Services
Expert Accessory Dwelling Unit (ADU) Drafting ServicesExpert Accessory Dwelling Unit (ADU) Drafting Services
Expert Accessory Dwelling Unit (ADU) Drafting Services
ResDraft
 
Borys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior designBorys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior design
boryssutkowski
 
Top Israeli Products and Brands - Plan it israel.pdf
Top Israeli Products and Brands - Plan it israel.pdfTop Israeli Products and Brands - Plan it israel.pdf
Top Israeli Products and Brands - Plan it israel.pdf
PlanitIsrael
 
vernacular architecture in response to climate.pdf
vernacular architecture in response to climate.pdfvernacular architecture in response to climate.pdf
vernacular architecture in response to climate.pdf
PrabhjeetSingh219035
 
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
7sd8fier
 
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
ameli25062005
 
Storytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design ProcessStorytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design Process
Chiara Aliotta
 
Transforming Brand Perception and Boosting Profitability
Transforming Brand Perception and Boosting ProfitabilityTransforming Brand Perception and Boosting Profitability
Transforming Brand Perception and Boosting Profitability
aaryangarg12
 
Connect Conference 2022: Passive House - Economic and Environmental Solution...
Connect Conference 2022: Passive House -  Economic and Environmental Solution...Connect Conference 2022: Passive House -  Economic and Environmental Solution...
Connect Conference 2022: Passive House - Economic and Environmental Solution...
TE Studio
 
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Mansi Shah
 

Recently uploaded (20)

一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
 
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
 
Mohannad Abdullah portfolio _ V2 _22-24
Mohannad Abdullah  portfolio _ V2 _22-24Mohannad Abdullah  portfolio _ V2 _22-24
Mohannad Abdullah portfolio _ V2 _22-24
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
 
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdfPORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
 
Book Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for DesignersBook Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for Designers
 
Portfolio.pdf
Portfolio.pdfPortfolio.pdf
Portfolio.pdf
 
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
 
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
 
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
 
Expert Accessory Dwelling Unit (ADU) Drafting Services
Expert Accessory Dwelling Unit (ADU) Drafting ServicesExpert Accessory Dwelling Unit (ADU) Drafting Services
Expert Accessory Dwelling Unit (ADU) Drafting Services
 
Borys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior designBorys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior design
 
Top Israeli Products and Brands - Plan it israel.pdf
Top Israeli Products and Brands - Plan it israel.pdfTop Israeli Products and Brands - Plan it israel.pdf
Top Israeli Products and Brands - Plan it israel.pdf
 
vernacular architecture in response to climate.pdf
vernacular architecture in response to climate.pdfvernacular architecture in response to climate.pdf
vernacular architecture in response to climate.pdf
 
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
 
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
 
Storytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design ProcessStorytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design Process
 
Transforming Brand Perception and Boosting Profitability
Transforming Brand Perception and Boosting ProfitabilityTransforming Brand Perception and Boosting Profitability
Transforming Brand Perception and Boosting Profitability
 
Connect Conference 2022: Passive House - Economic and Environmental Solution...
Connect Conference 2022: Passive House -  Economic and Environmental Solution...Connect Conference 2022: Passive House -  Economic and Environmental Solution...
Connect Conference 2022: Passive House - Economic and Environmental Solution...
 
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
 

Presentation.pptx

  • 3. WHAT IS CYBER CRIME?
  • 4. WHAT IS CYBER CRIME? • Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. • However, occasionally cybercrime aims to damage computers or networks for reasons other than profit. These could be political or personal. • Cybercrime can be carried out by individuals or organizations. Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others are novice hackers. • Cybercrime is incredibly organized and professionalized.
  • 5. HISTORY • The first recorded cybercrime was recorded in the year 1820. • The first spam email took place in 1978 when it was sent over the Arpanet. • The first virus was installed on an Apple computer in 1982.
  • 6. WHO ARE THEY? • Most cybercrimes are committed by individuals or small groups. However, large organized crime groups also take advantage of the internet. • These 'professional' criminals find new ways to commit old crimes, treating cybercrime like a business and forming global criminal communities. • Criminal communities share strategies and tools and can combine forces to launch coordinated attacks. • They even have underground market place where cyber criminals can buy and sell stolen information and identities.
  • 7. ATTACK TECHNIQUES: • BOTNET- a network of software robots, or bots ,that automatically spread malware. • ZOMBIE COMPUTER- a computer that has been hacked into and is used to launch malicious arracks or to become part of a botnet. • DENIAL OF SERVICE attackes -flooding a network or server with traffic in order to make it unavailable to its users. • SKIMMERS- Devices that steal credit card information when the card is swiped threw them. This can happen in stores or restaurants when the card is out the owner's view and frequently the credit card information is then sold online through a criminal community.
  • 8. List of Cybercrimes: • 1. Child Pornography OR Child sexually abusive material (CSAM) • Child sexually abusive material (CSAM) refers to a material containing sexual images in any form, of a child who is abused or sexually exploited. Section 67 (B) of the IT Act states that “it is punishable for publishing or transmitting of material depicting children in the sexually explicit act, etc. in electronic form. • 2. Cyber Bullying • A form of harassment or bullying inflicted through the use of electronic or communication devices such as computers, mobile phones, laptops, etc. • 3. Cyber Stalking • Cyberstalking is the use of electronic communication by a person to follow a person, or attempts to contact a person to foster personal interaction repeatedly despite a clear indication of disinterest by such person; or monitors the internet, email or any other form of electronic communication commits the offence of stalking. • 4. Online Job Fraud • Online Job Fraud is an attempt to defraud people who are in need of employment by giving them false hope/ promise of better employment with higher wages.
  • 9. List of Cybercrimes: • 5. Phishing • Phishing is a type of fraud that involves stealing personal information such as Customer ID, IPIN, Credit/Debit Card number, Card expiry date, CVV number, etc. through emails that appear to be from a legitimate source. • 6. Vishing • Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call. • 7. Smishing • Smishing is a type of fraud that uses mobile phone text messages to lure victims into calling back on a fraudulent phone number, visiting fraudulent websites or downloading malicious content via phone or web. • 8. Data Breach • A data breach is an incident in which information is accessed without authorization.
  • 10. TYPES OF CYBER ATTACK BY PERCENTAGE • Financial fraud: 11% • Sabotage of data/networks: 17% • Theft of proprietary information: 20% • System penetration from the outside: 25% • Denial of service: 27% • Unauthorized access by insiders: 71% • Employee abuse of internet privileges: 79% • Viruses: 85%
  • 11. How to protect yourself against cybercrime 1.Ensure your system is up-to-date 2.Use a secure internet connection 3.Use a strong password 4.Be aware of pop-ups and fraudulent emails 5.Protect yourself from identity threats 6.Manage your social media settings 7.Get right cyber insurance policy 8.Avoid the urge to save passwords in your browser 9.Do not trust everything on THE INTERNET
  • 12. CONCLUSION • Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.