SlideShare a Scribd company logo
CYBER CRIMECYBER CRIME
• Cyber Crime
What Is CYBER CRIMEWhat Is CYBER CRIME
• Cybercrime is defined as a crime in which a computer is the object of theCybercrime is defined as a crime in which a computer is the object of the
crime (hacking, phishing, spamming) or is used as a tool to commit ancrime (hacking, phishing, spamming) or is used as a tool to commit an
offense (child pornography, hate crimes). Cybercriminals may use computeroffense (child pornography, hate crimes). Cybercriminals may use computer
technology to access personal information, business trade secrets, or usetechnology to access personal information, business trade secrets, or use
the Internet for exploitive or malicious purposes. Criminals can also usethe Internet for exploitive or malicious purposes. Criminals can also use
computers for communication and document or data storage. Criminals whocomputers for communication and document or data storage. Criminals who
perform these illegal activities are often referred to as hackers.perform these illegal activities are often referred to as hackers.
• Cybercrime may also be referred to as computer crime.Cybercrime may also be referred to as computer crime.
tRuE ExaMplE of CYBER CRIMEtRuE ExaMplE of CYBER CRIME
IN 2015 Three people held guilty in online credit card scamIN 2015 Three people held guilty in online credit card scam
• Customers credit card details were misused through online means for
booking air-tickets. These culprits were caught by the city Cyber Crime
Investigation Cell in pune. It is found that details misused were belonging to 100
people.
•Mr. Parvesh Chauhan, ICICI Prudential Life Insurance officer had complained
on behalf of one of his customer. In this regard Mr. Sanjeet Mahavir Singh
Lukkad, Dharmendra Bhika Kale and Ahmead Sikandar Shaikh were arrested.
Lukkad being employeed at a private institution, Kale was his friend. Shaiklh was
employed in one of the branches of State Bank of India .
• According to the information provided by the police, one of the customer received a SMS
based alert for purchasing of the ticket even when the credit card was being held by him.
Customer was alert and came to know something was fishy; he enquired and came to
know about the misuse. He contacted the Bank in this regards. Police observed
involvement of many Bank's in this reference.
• The tickets were book through online means. Police requested for the log details and got
the information of the Private Institution. Investigation revealed that the details were
obtained from State Bank of India . Shaikh was working in the credit card department;
due to this he had access to credit card details of some customers. He gave that
information to Kale. Kale in return passed this information to his friend Lukkad. Using the
information obtained from Kale Lukkad booked tickets. He used to sell these tickets to
customers and get money for the same. He had given few tickets to various other
institutions.
• Cyber Cell head DCP Sunil Pulhari and PI Mohan MohadikarCyber Cell head DCP Sunil Pulhari and PI Mohan Mohadikar
A.P.I Kate were involved in eight days of investigation andA.P.I Kate were involved in eight days of investigation and
finally caught the culprits.finally caught the culprits.
• In this regards various Banks have been contacted; alsoIn this regards various Banks have been contacted; also
four air-line industries were contacted.four air-line industries were contacted.
DCP Sunil Pulhari has requested customers who have fallenDCP Sunil Pulhari has requested customers who have fallen
in to this trap to inform police authorities on 2612-4452 orin to this trap to inform police authorities on 2612-4452 or
2612-3346 if they have any problems.2612-3346 if they have any problems.
In 2015, thE top tEn REpoRtEd CYBERCRIMEsIn 2015, thE top tEn REpoRtEd CYBERCRIMEs
• 1.1. Non-delivery payment/ merchandise—Non-delivery payment/ merchandise—14.4 percent of the14.4 percent of the
sellers/purchasers did not receive payment/merchandise.sellers/purchasers did not receive payment/merchandise.
• 2.2. FBI-related scams—FBI-related scams—13.2 percent of criminals pose as the FBI to defraud13.2 percent of criminals pose as the FBI to defraud
victims.victims.
• 3.3. Identity Theft—Identity Theft—9.8 percent were unauthorized use of personal identifying9.8 percent were unauthorized use of personal identifying
information to commit crimes.information to commit crimes.
• 4.4. Computer crimes—Computer crimes—9.1 percent were crimes that target a computer or9.1 percent were crimes that target a computer or
were facilitated by a computer.were facilitated by a computer.
• 5.5. Miscellaneous fraud—Miscellaneous fraud—8.6 percent of scams and fraud included8.6 percent of scams and fraud included
sweepstakes and workfrom-home scamssweepstakes and workfrom-home scams
• 6.6. Advance fee fraud—Advance fee fraud—7.6 percent were the Nigerian letter scam.7.6 percent were the Nigerian letter scam.
• 7.7. SpamSpam—6.9 percent of users received unsolicited, mass—6.9 percent of users received unsolicited, mass
produced bulk messages.produced bulk messages.
• 8.8. Auction fraud—Auction fraud—5.9 percent was fraudulent or misleading5.9 percent was fraudulent or misleading
information in the context of an online auction site.information in the context of an online auction site.
• 9.9. Credit card fraud—Credit card fraud—5.3 percent was fraudulent charging of5.3 percent was fraudulent charging of
goods and/or services to a victim’s account.goods and/or services to a victim’s account.
• 10.10. Overpayment fraud—Overpayment fraud—5.3 percent of victims deposited bad5.3 percent of victims deposited bad
thE CoMMon tYpEs of CYBER CRIMEs MaY BEthE CoMMon tYpEs of CYBER CRIMEs MaY BE
dIsCussEd undER thE folloWIng hEads.dIsCussEd undER thE folloWIng hEads.
• 1. Hacking And Three types of hacker-1. Hacking And Three types of hacker-
a) White Hat Hackersa) White Hat Hackers
b) Black Hat Hackersb) Black Hat Hackers
c) Grey Hat Hackersc) Grey Hat Hackers
2. Cyber Stalking2. Cyber Stalking
3. Spamming3. Spamming
4. Cyber Pornography4. Cyber Pornography
• 4. Cyber Pornography4. Cyber Pornography
• 6. Software Piracy6. Software Piracy
• 7. Corporate Espionage7. Corporate Espionage
• 8. Money Laundering8. Money Laundering
• 9. Password Sniffers9. Password Sniffers
• 10. Credit Card Fraud10. Credit Card Fraud
• 11. Web Jacking11. Web Jacking
• 12. Cyber terrorism12. Cyber terrorism
• 1. Hacking –1. Hacking –
A hacker is an unauthorized user who attempts toA hacker is an unauthorized user who attempts to
or gains access to an information system. Hackingor gains access to an information system. Hacking
is a crime even if there is no visible damage to theis a crime even if there is no visible damage to the
system, since it is an invasion in to the privacy ofsystem, since it is an invasion in to the privacy of
data. There are different classes of Hackersdata. There are different classes of Hackers
Three Types Of hackersThree Types Of hackers
• A) White Hat Hackers -A) White Hat Hackers - They believe thatThey believe that
information sharing is good, and that it is their dutyinformation sharing is good, and that it is their duty
to share their expertise by facilitating access toto share their expertise by facilitating access to
information. However there are some white hatinformation. However there are some white hat
hackers who are just “joy riding" on computerhackers who are just “joy riding" on computer
systemssystems
• B) Black Hat Hackers -B) Black Hat Hackers - They cause damageThey cause damage
after intrusion. They may steal or modify dataafter intrusion. They may steal or modify data
or insert viruses or worms which damage theor insert viruses or worms which damage the
system. They are also called ‘crackers’.system. They are also called ‘crackers’.
• C) Grey Hat Hackers -C) Grey Hat Hackers - Typically ethical but occasionallyTypically ethical but occasionally
violates hacker ethics Hackers will hack into networks,violates hacker ethics Hackers will hack into networks,
stand-alone computers and software. Network hackers trystand-alone computers and software. Network hackers try
to gain unauthorized access to private computer networksto gain unauthorized access to private computer networks
just for challenge, curiosity, and distribution of information.just for challenge, curiosity, and distribution of information.
Crackers perform unauthorized intrusion with damage likeCrackers perform unauthorized intrusion with damage like
stealing or changing of information or inserting malwarestealing or changing of information or inserting malware
(viruses or worms(viruses or worms
• 2. Cyber Stalking –2. Cyber Stalking –
crime involves use of internet to harasscrime involves use of internet to harass
someone. The behavior includes falsesomeone. The behavior includes false
accusations, threats etc. Normally, majority ofaccusations, threats etc. Normally, majority of
cyber stalkers are men and the majority ofcyber stalkers are men and the majority of
victims are women.victims are women.
• 3. Spamming –3. Spamming –
Spamming is sending of unsolicited bulk andSpamming is sending of unsolicited bulk and
commercial messages over the internet. Althoughcommercial messages over the internet. Although
irritating to most email users, it is not illegal unlessirritating to most email users, it is not illegal unless
it causes damage such as overloading network andit causes damage such as overloading network and
disrupting service to subscribers or createsdisrupting service to subscribers or creates
.negative impact on consumer attitudes towards.negative impact on consumer attitudes towards
Internet Service Provider.Internet Service Provider.
• 4. Cyber Pornography –4. Cyber Pornography –
Women and children are victims ofWomen and children are victims of
sexual exploitation through internet. Pedophilessexual exploitation through internet. Pedophiles
use the internet to send photos of illegal childuse the internet to send photos of illegal child
pornography to targeted children so as topornography to targeted children so as to
attract children to such funs. Later they areattract children to such funs. Later they are
sexually exploited for gains.sexually exploited for gains.
• 5.5. PhishingPhishing ––
It is a criminally fraudulent process ofIt is a criminally fraudulent process of
acquiring sensitive information such asacquiring sensitive information such as
username, passwords and credit card detailsusername, passwords and credit card details
by disguising as a trustworthy entity in anby disguising as a trustworthy entity in an
electronic communication.electronic communication.
• 6. Software Piracy –6. Software Piracy –
It is an illegal reproduction and distributionIt is an illegal reproduction and distribution
of software for business or personal use. This isof software for business or personal use. This is
considered to be a type of infringement of copy rightconsidered to be a type of infringement of copy right
and a violation of a license agreement. Since theand a violation of a license agreement. Since the
unauthorized user is not a party to the licenseunauthorized user is not a party to the license
agreement it is difficult to find out remedies.agreement it is difficult to find out remedies.
• 7. Corporate Espionage –7. Corporate Espionage –
It means theft of trade secrets through illegal meansIt means theft of trade secrets through illegal means
such as wire taps or illegal intrusions.such as wire taps or illegal intrusions.
• 8. Money Laundering –8. Money Laundering –
It means moving of illegally acquired cash throughIt means moving of illegally acquired cash through
financial and other systems so that it appears to be legally acquired. eg.financial and other systems so that it appears to be legally acquired. eg.
Transport cash to a country having less stringent banking regulations andTransport cash to a country having less stringent banking regulations and
move it back by way of loans the interest of which can re deducted from hismove it back by way of loans the interest of which can re deducted from his
taxes. This is possible prior to computer and internet technology, electronictaxes. This is possible prior to computer and internet technology, electronic
transfers have made it easier and more successful.transfers have made it easier and more successful.
9. Password Sniffers -9. Password Sniffers -
Password sniffers arePassword sniffers are
programmes that monitor and record the name andprogrammes that monitor and record the name and
password of network users as they log in, jeopardizingpassword of network users as they log in, jeopardizing
security at a site. Whoever installs the sniffer cansecurity at a site. Whoever installs the sniffer can
impersonate an authorized user and log in to access onimpersonate an authorized user and log in to access on
restricted documents.restricted documents.
• 10. Credit Card Fraud –10. Credit Card Fraud –
In U.S.A. half a billion dollars have beenIn U.S.A. half a billion dollars have been
lost annually by consumers who have credit cards andlost annually by consumers who have credit cards and
calling card numbers. These are stolen from on-linecalling card numbers. These are stolen from on-line
databases.databases.
• 11. Web Jacking –11. Web Jacking –
The term refers to forceful taking ofThe term refers to forceful taking of
control of a web site by cracking the password.control of a web site by cracking the password.
• 12. Cyber terrorism -12. Cyber terrorism - The use of computer resources toThe use of computer resources to
intimidate or coerce government, the civilian population orintimidate or coerce government, the civilian population or
any segment thereof in furtherance of political or socialany segment thereof in furtherance of political or social
objectives is called cyber terrorism. Individuals and groupsobjectives is called cyber terrorism. Individuals and groups
quite often try to exploit anonymous character of thequite often try to exploit anonymous character of the
internet to threaten governments and terrorize the citizensinternet to threaten governments and terrorize the citizens
of the country.of the country.
12 Ways to Protect yourself from cyber crime12 Ways to Protect yourself from cyber crime
• Use anti-virus software:Use anti-virus software:
• Didn't expect, don't clickDidn't expect, don't click
• Different site, different passwords:Different site, different passwords:
• If in doubt, blockIf in doubt, block
• Don't bank on public wi-fiDon't bank on public wi-fi
• Only shop online on secure sitesOnly shop online on secure sites
• More than one email accountMore than one email account
• Ignore pop-upsIgnore pop-ups
• MACs are as vulnerable as PCsMACs are as vulnerable as PCs
• Two-step verificationTwo-step verification
• Lock down your FB accountLock down your FB account
• Don't store your card details on websites:Don't store your card details on websites:
What is cyber laW?What is cyber laW?
• Cyber LawCyber Law or Internet  or Internet lawlaw is a term that is a term that
encapsulates the legal issues related to use of theencapsulates the legal issues related to use of the
Internet. It is less a distinct field of Internet. It is less a distinct field of lawlaw than than
intellectual property or contract intellectual property or contract lawlaw, as it is a, as it is a
domain covering many areas of domain covering many areas of lawlaw and regulation. and regulation.
What is cyber attacks&tyPes?
• A Cyber Attacks in simple terms, is an attacks onA Cyber Attacks in simple terms, is an attacks on
your digital system originating from malicious acts ofyour digital system originating from malicious acts of
an anonymous source.an anonymous source.
• Cyber attacks allows for an illegal access to yourCyber attacks allows for an illegal access to your
digital device, while gaining access or control of yourdigital device, while gaining access or control of your
digital device.digital device.
tyPes of cyber attacks
• 1. Backdoors1. Backdoors
• 2. Direct-access Attack2. Direct-access Attack
• 3. Spoofing 3. Spoofing 
• 4. Repudiation Attack4. Repudiation Attack
• 5.Information Disclosure5.Information Disclosure
• 6. Indirect attack6. Indirect attack
• 7. Computer crime7. Computer crime
• 8. Spyware8. Spyware
• 9. Scareware9. Scareware
• 10.Trojan Horses10.Trojan Horses
• 11. Virus11. Virus
• 12. Identity Theft 12. Identity Theft 
• 13. Password Attacks 13. Password Attacks 
• 14. Bluejacking14. Bluejacking
• 15. Phishing15. Phishing
What is hacking
• Hacking is the practice of modifying the features of aHacking is the practice of modifying the features of a
system, in order to accomplish a goal outside of thesystem, in order to accomplish a goal outside of the
creator's original purpose. The person who iscreator's original purpose. The person who is
consistently engaging in hacking activities, and hasconsistently engaging in hacking activities, and has
accepted hacking as a lifestyle and philosophy ofaccepted hacking as a lifestyle and philosophy of
their choice, is called a hacker.their choice, is called a hacker.
Victims per yearVictims per year 556 million556 million
Victims per dayVictims per day Over 1.5 millionOver 1.5 million
Victims per secondVictims per second 1818
Identities exposedIdentities exposed More than 232.4 millionMore than 232.4 million
Yearly Cyber Crime Victim Count EstimateYearly Cyber Crime Victim Count Estimate
More than 600,000 FaceBook accounts are compromised every day.More than 600,000 FaceBook accounts are compromised every day.
15% of social network users have reported that their profiles have been hacked by pretenders.15% of social network users have reported that their profiles have been hacked by pretenders.
1 in 10 social network users said they’d fallen victim to a scam or fake link on social network platforms1 in 10 social network users said they’d fallen victim to a scam or fake link on social network platforms
  Attack TypesAttack Types %%
Viruses, malware, worms, trojansViruses, malware, worms, trojans 50%50%
Criminal insiderCriminal insider 33%33%
Theft of data-bearing devicesTheft of data-bearing devices 28%28%
SQL injectionSQL injection 28%28%
PhishingPhishing 22%22%
Web-based attacksWeb-based attacks 17%17%
Social engineeringSocial engineering 17%17%
OtherOther 11%11%
Common Types Of Cyber AttacksCommon Types Of Cyber Attacks
Botnets have been using as many as 120,000 infected “Botnets have been using as many as 120,000 infected “zombiezombie” computers to send out spam each day.” computers to send out spam each day.
GenderGender %age%age
MaleMale 71%71%
FemalesFemales 63%63%
% Of Cybercrime Victims By Gender% Of Cybercrime Victims By Gender
59% of 59% of ex-employeesex-employees admitted to stealing company data when leaving previous jobs admitted to stealing company data when leaving previous jobs
IndustryIndustry %%
Medical/HealthcareMedical/Healthcare 38.938.9
BusinessBusiness 35.135.1
EducationalEducational 10.710.7
Government/MilitaryGovernment/Military 9.99.9
Banking/Credit/FinancialBanking/Credit/Financial 5.35.3
Data Breach Statistics By IndustryData Breach Statistics By Industry
top 15 countries Where cyber attackstop 15 countries Where cyber attacks
originateoriginate
Countries Attacks
Russia 2,448,525
Taiwan 925,910
Germany 780,142
Ukraine 566,524
Hungary 367,329
USA 355,466
Romania 350,485
Brazil 325,521
Italy 268,461
Australia 236,582
Argentina 196,514
China 185,456
Poland 165,410
Israel 155,444
Japan 125,852
SuyashSuyash
Suyash SinhaSuyash Sinha
ssuyash46@yahoo.inssuyash46@yahoo.in

More Related Content

What's hot

Cyber crime
Cyber crimeCyber crime
Cyber crime
Mahabubur Rahman
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
Shubh Thakkar
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
Nalneesh Gaur
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 
Ppt
PptPpt
Phishing
PhishingPhishing
Phishing
HHSome
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Tushar Malhotra
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Avinash
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
Vishwadeep Badgujar
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Ppt
PptPpt
Ppt
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 

Viewers also liked

Neurosains dan moralitas
Neurosains dan moralitasNeurosains dan moralitas
Neurosains dan moralitas
Cokhy Fasha
 
How biotechnology could improve life
How biotechnology could improve lifeHow biotechnology could improve life
How biotechnology could improve life
Cokhy Fasha
 
WooCommerce Meetup Utrecht
WooCommerce Meetup UtrechtWooCommerce Meetup Utrecht
WooCommerce Meetup Utrecht
Theo van der Zee
 
Cybercrime in the Modern Market - Legal Remedies Offshore
Cybercrime in the Modern Market - Legal Remedies OffshoreCybercrime in the Modern Market - Legal Remedies Offshore
Cybercrime in the Modern Market - Legal Remedies Offshore
bakerpartners
 
The Future of Wearables at WoHIT 2016 by The Wearables Expert
The Future of Wearables at WoHIT 2016 by The Wearables ExpertThe Future of Wearables at WoHIT 2016 by The Wearables Expert
The Future of Wearables at WoHIT 2016 by The Wearables Expert
João Bocas
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
Ramiro Cid
 
Shadow Economy
Shadow EconomyShadow Economy
Shadow Economy
Ksyunya
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
Digital Bond
 
Advancement in medical technology
Advancement in medical technologyAdvancement in medical technology
Advancement in medical technology
Cokhy Fasha
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Symantec
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
Shaheda Afreen
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
Ramiro Cid
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
InvestorSymantec
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
Ahmed Banafa
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
InvestorSymantec
 
Gender and crime
Gender and crimeGender and crime
Gender and crimesmccormac7
 
The future of the marketing tech stack
The future of the marketing tech stackThe future of the marketing tech stack
The future of the marketing tech stack
Marc Keating
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
FireEye, Inc.
 
Wearable Tech Show 17 #WTS2017 Personalization the future for health, fitness...
Wearable Tech Show 17 #WTS2017 Personalization the future for health, fitness...Wearable Tech Show 17 #WTS2017 Personalization the future for health, fitness...
Wearable Tech Show 17 #WTS2017 Personalization the future for health, fitness...
João Bocas
 

Viewers also liked (20)

Neurosains dan moralitas
Neurosains dan moralitasNeurosains dan moralitas
Neurosains dan moralitas
 
How biotechnology could improve life
How biotechnology could improve lifeHow biotechnology could improve life
How biotechnology could improve life
 
WooCommerce Meetup Utrecht
WooCommerce Meetup UtrechtWooCommerce Meetup Utrecht
WooCommerce Meetup Utrecht
 
Cybercrime in the Modern Market - Legal Remedies Offshore
Cybercrime in the Modern Market - Legal Remedies OffshoreCybercrime in the Modern Market - Legal Remedies Offshore
Cybercrime in the Modern Market - Legal Remedies Offshore
 
The Future of Wearables at WoHIT 2016 by The Wearables Expert
The Future of Wearables at WoHIT 2016 by The Wearables ExpertThe Future of Wearables at WoHIT 2016 by The Wearables Expert
The Future of Wearables at WoHIT 2016 by The Wearables Expert
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Shadow Economy
Shadow EconomyShadow Economy
Shadow Economy
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
Advancement in medical technology
Advancement in medical technologyAdvancement in medical technology
Advancement in medical technology
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
 
Gender and crime
Gender and crimeGender and crime
Gender and crime
 
The future of the marketing tech stack
The future of the marketing tech stackThe future of the marketing tech stack
The future of the marketing tech stack
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
Wearable Tech Show 17 #WTS2017 Personalization the future for health, fitness...
Wearable Tech Show 17 #WTS2017 Personalization the future for health, fitness...Wearable Tech Show 17 #WTS2017 Personalization the future for health, fitness...
Wearable Tech Show 17 #WTS2017 Personalization the future for health, fitness...
 

Similar to CYBER CRIME ppt

Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
Syed Rizwan Ali
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Fit Tri
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
Suman Thapaliya
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
PrinceKumar851167
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in managementlily004
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
SEO2India - Devang Barot - SEO2India
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
Muhammad Zubair
 
Cyber crimes & cyber security
Cyber crimes & cyber securityCyber crimes & cyber security
Cyber crimes & cyber security
DR. Hossam Elshenraki
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
Jose L. Quiñones-Borrero
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
Steve Poole
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
Talwant Singh
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
Parag Deodhar
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
vishalgohel12195
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb21
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
Aalbert Albert
 

Similar to CYBER CRIME ppt (20)

Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in management
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber crimes & cyber security
Cyber crimes & cyber securityCyber crimes & cyber security
Cyber crimes & cyber security
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 

Recently uploaded

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 

Recently uploaded (20)

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 

CYBER CRIME ppt

  • 2.
  • 3. What Is CYBER CRIMEWhat Is CYBER CRIME • Cybercrime is defined as a crime in which a computer is the object of theCybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit ancrime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computeroffense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets, or usetechnology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals can also usethe Internet for exploitive or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals whocomputers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers.perform these illegal activities are often referred to as hackers. • Cybercrime may also be referred to as computer crime.Cybercrime may also be referred to as computer crime.
  • 4. tRuE ExaMplE of CYBER CRIMEtRuE ExaMplE of CYBER CRIME IN 2015 Three people held guilty in online credit card scamIN 2015 Three people held guilty in online credit card scam • Customers credit card details were misused through online means for booking air-tickets. These culprits were caught by the city Cyber Crime Investigation Cell in pune. It is found that details misused were belonging to 100 people. •Mr. Parvesh Chauhan, ICICI Prudential Life Insurance officer had complained on behalf of one of his customer. In this regard Mr. Sanjeet Mahavir Singh Lukkad, Dharmendra Bhika Kale and Ahmead Sikandar Shaikh were arrested. Lukkad being employeed at a private institution, Kale was his friend. Shaiklh was employed in one of the branches of State Bank of India .
  • 5. • According to the information provided by the police, one of the customer received a SMS based alert for purchasing of the ticket even when the credit card was being held by him. Customer was alert and came to know something was fishy; he enquired and came to know about the misuse. He contacted the Bank in this regards. Police observed involvement of many Bank's in this reference. • The tickets were book through online means. Police requested for the log details and got the information of the Private Institution. Investigation revealed that the details were obtained from State Bank of India . Shaikh was working in the credit card department; due to this he had access to credit card details of some customers. He gave that information to Kale. Kale in return passed this information to his friend Lukkad. Using the information obtained from Kale Lukkad booked tickets. He used to sell these tickets to customers and get money for the same. He had given few tickets to various other institutions.
  • 6. • Cyber Cell head DCP Sunil Pulhari and PI Mohan MohadikarCyber Cell head DCP Sunil Pulhari and PI Mohan Mohadikar A.P.I Kate were involved in eight days of investigation andA.P.I Kate were involved in eight days of investigation and finally caught the culprits.finally caught the culprits. • In this regards various Banks have been contacted; alsoIn this regards various Banks have been contacted; also four air-line industries were contacted.four air-line industries were contacted. DCP Sunil Pulhari has requested customers who have fallenDCP Sunil Pulhari has requested customers who have fallen in to this trap to inform police authorities on 2612-4452 orin to this trap to inform police authorities on 2612-4452 or 2612-3346 if they have any problems.2612-3346 if they have any problems.
  • 7. In 2015, thE top tEn REpoRtEd CYBERCRIMEsIn 2015, thE top tEn REpoRtEd CYBERCRIMEs • 1.1. Non-delivery payment/ merchandise—Non-delivery payment/ merchandise—14.4 percent of the14.4 percent of the sellers/purchasers did not receive payment/merchandise.sellers/purchasers did not receive payment/merchandise. • 2.2. FBI-related scams—FBI-related scams—13.2 percent of criminals pose as the FBI to defraud13.2 percent of criminals pose as the FBI to defraud victims.victims. • 3.3. Identity Theft—Identity Theft—9.8 percent were unauthorized use of personal identifying9.8 percent were unauthorized use of personal identifying information to commit crimes.information to commit crimes. • 4.4. Computer crimes—Computer crimes—9.1 percent were crimes that target a computer or9.1 percent were crimes that target a computer or were facilitated by a computer.were facilitated by a computer. • 5.5. Miscellaneous fraud—Miscellaneous fraud—8.6 percent of scams and fraud included8.6 percent of scams and fraud included sweepstakes and workfrom-home scamssweepstakes and workfrom-home scams
  • 8. • 6.6. Advance fee fraud—Advance fee fraud—7.6 percent were the Nigerian letter scam.7.6 percent were the Nigerian letter scam. • 7.7. SpamSpam—6.9 percent of users received unsolicited, mass—6.9 percent of users received unsolicited, mass produced bulk messages.produced bulk messages. • 8.8. Auction fraud—Auction fraud—5.9 percent was fraudulent or misleading5.9 percent was fraudulent or misleading information in the context of an online auction site.information in the context of an online auction site. • 9.9. Credit card fraud—Credit card fraud—5.3 percent was fraudulent charging of5.3 percent was fraudulent charging of goods and/or services to a victim’s account.goods and/or services to a victim’s account. • 10.10. Overpayment fraud—Overpayment fraud—5.3 percent of victims deposited bad5.3 percent of victims deposited bad
  • 9. thE CoMMon tYpEs of CYBER CRIMEs MaY BEthE CoMMon tYpEs of CYBER CRIMEs MaY BE dIsCussEd undER thE folloWIng hEads.dIsCussEd undER thE folloWIng hEads. • 1. Hacking And Three types of hacker-1. Hacking And Three types of hacker- a) White Hat Hackersa) White Hat Hackers b) Black Hat Hackersb) Black Hat Hackers c) Grey Hat Hackersc) Grey Hat Hackers 2. Cyber Stalking2. Cyber Stalking 3. Spamming3. Spamming 4. Cyber Pornography4. Cyber Pornography
  • 10. • 4. Cyber Pornography4. Cyber Pornography • 6. Software Piracy6. Software Piracy • 7. Corporate Espionage7. Corporate Espionage • 8. Money Laundering8. Money Laundering • 9. Password Sniffers9. Password Sniffers
  • 11. • 10. Credit Card Fraud10. Credit Card Fraud • 11. Web Jacking11. Web Jacking • 12. Cyber terrorism12. Cyber terrorism
  • 12. • 1. Hacking –1. Hacking – A hacker is an unauthorized user who attempts toA hacker is an unauthorized user who attempts to or gains access to an information system. Hackingor gains access to an information system. Hacking is a crime even if there is no visible damage to theis a crime even if there is no visible damage to the system, since it is an invasion in to the privacy ofsystem, since it is an invasion in to the privacy of data. There are different classes of Hackersdata. There are different classes of Hackers
  • 13. Three Types Of hackersThree Types Of hackers • A) White Hat Hackers -A) White Hat Hackers - They believe thatThey believe that information sharing is good, and that it is their dutyinformation sharing is good, and that it is their duty to share their expertise by facilitating access toto share their expertise by facilitating access to information. However there are some white hatinformation. However there are some white hat hackers who are just “joy riding" on computerhackers who are just “joy riding" on computer systemssystems
  • 14. • B) Black Hat Hackers -B) Black Hat Hackers - They cause damageThey cause damage after intrusion. They may steal or modify dataafter intrusion. They may steal or modify data or insert viruses or worms which damage theor insert viruses or worms which damage the system. They are also called ‘crackers’.system. They are also called ‘crackers’.
  • 15. • C) Grey Hat Hackers -C) Grey Hat Hackers - Typically ethical but occasionallyTypically ethical but occasionally violates hacker ethics Hackers will hack into networks,violates hacker ethics Hackers will hack into networks, stand-alone computers and software. Network hackers trystand-alone computers and software. Network hackers try to gain unauthorized access to private computer networksto gain unauthorized access to private computer networks just for challenge, curiosity, and distribution of information.just for challenge, curiosity, and distribution of information. Crackers perform unauthorized intrusion with damage likeCrackers perform unauthorized intrusion with damage like stealing or changing of information or inserting malwarestealing or changing of information or inserting malware (viruses or worms(viruses or worms
  • 16. • 2. Cyber Stalking –2. Cyber Stalking – crime involves use of internet to harasscrime involves use of internet to harass someone. The behavior includes falsesomeone. The behavior includes false accusations, threats etc. Normally, majority ofaccusations, threats etc. Normally, majority of cyber stalkers are men and the majority ofcyber stalkers are men and the majority of victims are women.victims are women.
  • 17. • 3. Spamming –3. Spamming – Spamming is sending of unsolicited bulk andSpamming is sending of unsolicited bulk and commercial messages over the internet. Althoughcommercial messages over the internet. Although irritating to most email users, it is not illegal unlessirritating to most email users, it is not illegal unless it causes damage such as overloading network andit causes damage such as overloading network and disrupting service to subscribers or createsdisrupting service to subscribers or creates .negative impact on consumer attitudes towards.negative impact on consumer attitudes towards Internet Service Provider.Internet Service Provider.
  • 18. • 4. Cyber Pornography –4. Cyber Pornography – Women and children are victims ofWomen and children are victims of sexual exploitation through internet. Pedophilessexual exploitation through internet. Pedophiles use the internet to send photos of illegal childuse the internet to send photos of illegal child pornography to targeted children so as topornography to targeted children so as to attract children to such funs. Later they areattract children to such funs. Later they are sexually exploited for gains.sexually exploited for gains.
  • 19. • 5.5. PhishingPhishing –– It is a criminally fraudulent process ofIt is a criminally fraudulent process of acquiring sensitive information such asacquiring sensitive information such as username, passwords and credit card detailsusername, passwords and credit card details by disguising as a trustworthy entity in anby disguising as a trustworthy entity in an electronic communication.electronic communication.
  • 20. • 6. Software Piracy –6. Software Piracy – It is an illegal reproduction and distributionIt is an illegal reproduction and distribution of software for business or personal use. This isof software for business or personal use. This is considered to be a type of infringement of copy rightconsidered to be a type of infringement of copy right and a violation of a license agreement. Since theand a violation of a license agreement. Since the unauthorized user is not a party to the licenseunauthorized user is not a party to the license agreement it is difficult to find out remedies.agreement it is difficult to find out remedies.
  • 21. • 7. Corporate Espionage –7. Corporate Espionage – It means theft of trade secrets through illegal meansIt means theft of trade secrets through illegal means such as wire taps or illegal intrusions.such as wire taps or illegal intrusions. • 8. Money Laundering –8. Money Laundering – It means moving of illegally acquired cash throughIt means moving of illegally acquired cash through financial and other systems so that it appears to be legally acquired. eg.financial and other systems so that it appears to be legally acquired. eg. Transport cash to a country having less stringent banking regulations andTransport cash to a country having less stringent banking regulations and move it back by way of loans the interest of which can re deducted from hismove it back by way of loans the interest of which can re deducted from his taxes. This is possible prior to computer and internet technology, electronictaxes. This is possible prior to computer and internet technology, electronic transfers have made it easier and more successful.transfers have made it easier and more successful.
  • 22. 9. Password Sniffers -9. Password Sniffers - Password sniffers arePassword sniffers are programmes that monitor and record the name andprogrammes that monitor and record the name and password of network users as they log in, jeopardizingpassword of network users as they log in, jeopardizing security at a site. Whoever installs the sniffer cansecurity at a site. Whoever installs the sniffer can impersonate an authorized user and log in to access onimpersonate an authorized user and log in to access on restricted documents.restricted documents.
  • 23. • 10. Credit Card Fraud –10. Credit Card Fraud – In U.S.A. half a billion dollars have beenIn U.S.A. half a billion dollars have been lost annually by consumers who have credit cards andlost annually by consumers who have credit cards and calling card numbers. These are stolen from on-linecalling card numbers. These are stolen from on-line databases.databases. • 11. Web Jacking –11. Web Jacking – The term refers to forceful taking ofThe term refers to forceful taking of control of a web site by cracking the password.control of a web site by cracking the password.
  • 24. • 12. Cyber terrorism -12. Cyber terrorism - The use of computer resources toThe use of computer resources to intimidate or coerce government, the civilian population orintimidate or coerce government, the civilian population or any segment thereof in furtherance of political or socialany segment thereof in furtherance of political or social objectives is called cyber terrorism. Individuals and groupsobjectives is called cyber terrorism. Individuals and groups quite often try to exploit anonymous character of thequite often try to exploit anonymous character of the internet to threaten governments and terrorize the citizensinternet to threaten governments and terrorize the citizens of the country.of the country.
  • 25. 12 Ways to Protect yourself from cyber crime12 Ways to Protect yourself from cyber crime • Use anti-virus software:Use anti-virus software: • Didn't expect, don't clickDidn't expect, don't click • Different site, different passwords:Different site, different passwords: • If in doubt, blockIf in doubt, block • Don't bank on public wi-fiDon't bank on public wi-fi • Only shop online on secure sitesOnly shop online on secure sites
  • 26. • More than one email accountMore than one email account • Ignore pop-upsIgnore pop-ups • MACs are as vulnerable as PCsMACs are as vulnerable as PCs • Two-step verificationTwo-step verification • Lock down your FB accountLock down your FB account • Don't store your card details on websites:Don't store your card details on websites:
  • 27. What is cyber laW?What is cyber laW? • Cyber LawCyber Law or Internet  or Internet lawlaw is a term that is a term that encapsulates the legal issues related to use of theencapsulates the legal issues related to use of the Internet. It is less a distinct field of Internet. It is less a distinct field of lawlaw than than intellectual property or contract intellectual property or contract lawlaw, as it is a, as it is a domain covering many areas of domain covering many areas of lawlaw and regulation. and regulation.
  • 28. What is cyber attacks&tyPes? • A Cyber Attacks in simple terms, is an attacks onA Cyber Attacks in simple terms, is an attacks on your digital system originating from malicious acts ofyour digital system originating from malicious acts of an anonymous source.an anonymous source. • Cyber attacks allows for an illegal access to yourCyber attacks allows for an illegal access to your digital device, while gaining access or control of yourdigital device, while gaining access or control of your digital device.digital device.
  • 29. tyPes of cyber attacks • 1. Backdoors1. Backdoors • 2. Direct-access Attack2. Direct-access Attack • 3. Spoofing 3. Spoofing  • 4. Repudiation Attack4. Repudiation Attack • 5.Information Disclosure5.Information Disclosure • 6. Indirect attack6. Indirect attack • 7. Computer crime7. Computer crime • 8. Spyware8. Spyware
  • 30. • 9. Scareware9. Scareware • 10.Trojan Horses10.Trojan Horses • 11. Virus11. Virus • 12. Identity Theft 12. Identity Theft  • 13. Password Attacks 13. Password Attacks  • 14. Bluejacking14. Bluejacking • 15. Phishing15. Phishing
  • 31. What is hacking • Hacking is the practice of modifying the features of aHacking is the practice of modifying the features of a system, in order to accomplish a goal outside of thesystem, in order to accomplish a goal outside of the creator's original purpose. The person who iscreator's original purpose. The person who is consistently engaging in hacking activities, and hasconsistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy ofaccepted hacking as a lifestyle and philosophy of their choice, is called a hacker.their choice, is called a hacker.
  • 32.
  • 33. Victims per yearVictims per year 556 million556 million Victims per dayVictims per day Over 1.5 millionOver 1.5 million Victims per secondVictims per second 1818 Identities exposedIdentities exposed More than 232.4 millionMore than 232.4 million Yearly Cyber Crime Victim Count EstimateYearly Cyber Crime Victim Count Estimate More than 600,000 FaceBook accounts are compromised every day.More than 600,000 FaceBook accounts are compromised every day. 15% of social network users have reported that their profiles have been hacked by pretenders.15% of social network users have reported that their profiles have been hacked by pretenders. 1 in 10 social network users said they’d fallen victim to a scam or fake link on social network platforms1 in 10 social network users said they’d fallen victim to a scam or fake link on social network platforms
  • 34.   Attack TypesAttack Types %% Viruses, malware, worms, trojansViruses, malware, worms, trojans 50%50% Criminal insiderCriminal insider 33%33% Theft of data-bearing devicesTheft of data-bearing devices 28%28% SQL injectionSQL injection 28%28% PhishingPhishing 22%22% Web-based attacksWeb-based attacks 17%17% Social engineeringSocial engineering 17%17% OtherOther 11%11% Common Types Of Cyber AttacksCommon Types Of Cyber Attacks Botnets have been using as many as 120,000 infected “Botnets have been using as many as 120,000 infected “zombiezombie” computers to send out spam each day.” computers to send out spam each day.
  • 35. GenderGender %age%age MaleMale 71%71% FemalesFemales 63%63% % Of Cybercrime Victims By Gender% Of Cybercrime Victims By Gender 59% of 59% of ex-employeesex-employees admitted to stealing company data when leaving previous jobs admitted to stealing company data when leaving previous jobs
  • 36. IndustryIndustry %% Medical/HealthcareMedical/Healthcare 38.938.9 BusinessBusiness 35.135.1 EducationalEducational 10.710.7 Government/MilitaryGovernment/Military 9.99.9 Banking/Credit/FinancialBanking/Credit/Financial 5.35.3 Data Breach Statistics By IndustryData Breach Statistics By Industry
  • 37. top 15 countries Where cyber attackstop 15 countries Where cyber attacks originateoriginate Countries Attacks Russia 2,448,525 Taiwan 925,910 Germany 780,142 Ukraine 566,524 Hungary 367,329 USA 355,466 Romania 350,485
  • 38. Brazil 325,521 Italy 268,461 Australia 236,582 Argentina 196,514 China 185,456 Poland 165,410 Israel 155,444 Japan 125,852