SlideShare a Scribd company logo
1 of 11
 What is cyber crime?
 Cyber crime variants
 Phishing
 Cyber stalking
 vishing
• Any offence against morality, social order or any unjust
or shameful act.
• “Offence" -in the Code of Criminal Procedure to mean
as an act or omission made punishable by any law for
the time being in force.
• Cyber Crime is emerging as a serious threat. World wide
governments, police departments and intelligence units
have started to react.
Cyber Crime Variants
•Hacking
Hacking is a crime, which entails cracking systems
and gaining unauthorized access to the data stored
in them. Hacking had witnessed a 37 per cent
increase this year.
•Cyber Squatting
Cyber Squatting is the act of registering a famous
Domain Name and then selling it for a fortune.
•Phishing is just one of the many frauds
on the Internet, trying to fool people into
parting with their money.
•Phishing refers to the receipt of
unsolicited emails by customers of
Financial Institutions, requesting them to
enter their Username, Password or other
personal information to access their
Account for some reason.
•The fraudster then has access to the
customer's online bank account and to the
funds contained in that account.
 Spear phishing
 Clone phishing
 whaling
Cyber stalking
•Cyber Stalking is use of the Internet or other
electronic means to stalk someone.
•This term is used interchangeably with online
harassment and online abuse.
• Stalking generally involves harassing or threatening
behaviour that an individual engages in repeatedly,
such as following a person, appearing at a person's
home or place of business, making harassing phone
calls, leaving written messages or objects, or
vandalizing a person's property.
Friday, 22 July 2016
•Vishing is the criminal practice of using
social engineering and Voice over IP
(VoIP) to gain access to private personal
and financial information from the public
for the purpose of financial reward.
• The term is a combination of “Voice"
and phishing.
• Vishing exploits the public's trust in
landline telephone services.
•Vishing is typically used to steal credit
card numbers or other information used in
identity theft schemes from individuals.
VISHING
Friday, 22 July 2016
Decrease in broken software =
Increase in good software
CyberSecurity
CyberCrime
VS Graph - two sides of the same coin
The Coin : Broken/Complex Software
Cyber Security : One side of the coin
Cyber Crime : Other side of the coin
Traditional problem associated with cyber crime

More Related Content

What's hot (20)

Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 

Similar to Traditional problem associated with cyber crime

Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Sooraj Maurya
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeDevanshi Solanki
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptxClichesin
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thKartik Chhabra
 
Investigating & proving cybercrime
Investigating & proving cybercrimeInvestigating & proving cybercrime
Investigating & proving cybercrimeJenny Reid
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 

Similar to Traditional problem associated with cyber crime (20)

Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Investigating & proving cybercrime
Investigating & proving cybercrimeInvestigating & proving cybercrime
Investigating & proving cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 

More from vishalgohel12195

Variable frequency drive and variable frequency control
Variable frequency drive and variable frequency controlVariable frequency drive and variable frequency control
Variable frequency drive and variable frequency controlvishalgohel12195
 
Self control of synchronous motor drives
Self control of synchronous motor drivesSelf control of synchronous motor drives
Self control of synchronous motor drivesvishalgohel12195
 
Owen’s bridge and measurement of increment inductance
Owen’s bridge and measurement of increment inductanceOwen’s bridge and measurement of increment inductance
Owen’s bridge and measurement of increment inductancevishalgohel12195
 
Initial and final condition for circuit
Initial and final condition for circuitInitial and final condition for circuit
Initial and final condition for circuitvishalgohel12195
 
FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS
FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS  FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS
FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS vishalgohel12195
 
Differential equations of first order
Differential equations of first orderDifferential equations of first order
Differential equations of first ordervishalgohel12195
 
Cost for production including breaking analysis
Cost for production including breaking  analysisCost for production including breaking  analysis
Cost for production including breaking analysisvishalgohel12195
 
Concept of general terms pertaining to rotating machines
Concept of general terms pertaining to rotating machinesConcept of general terms pertaining to rotating machines
Concept of general terms pertaining to rotating machinesvishalgohel12195
 
Transfer function and mathematical modeling
Transfer  function  and  mathematical  modelingTransfer  function  and  mathematical  modeling
Transfer function and mathematical modelingvishalgohel12195
 
Sag in overhead transmission line, sag calculation & string chart
Sag in overhead transmission line, sag   calculation & string chartSag in overhead transmission line, sag   calculation & string chart
Sag in overhead transmission line, sag calculation & string chartvishalgohel12195
 
Protection against overvoltage
Protection against overvoltageProtection against overvoltage
Protection against overvoltagevishalgohel12195
 
Pantograph,catenary wire,smothing reactor
Pantograph,catenary wire,smothing reactorPantograph,catenary wire,smothing reactor
Pantograph,catenary wire,smothing reactorvishalgohel12195
 
On load tap changer in a.c. locomotive transformer & air blast circuit b...
On load tap changer in a.c. locomotive transformer  & air blast circuit b...On load tap changer in a.c. locomotive transformer  & air blast circuit b...
On load tap changer in a.c. locomotive transformer & air blast circuit b...vishalgohel12195
 
Logical instruction of 8085
Logical instruction of 8085Logical instruction of 8085
Logical instruction of 8085vishalgohel12195
 
Effect of non sinusoidal waveform of a.c. machine performance
Effect of non sinusoidal waveform of a.c. machine performanceEffect of non sinusoidal waveform of a.c. machine performance
Effect of non sinusoidal waveform of a.c. machine performancevishalgohel12195
 
Disadvantages of corona, radio interference, inductive interference between p...
Disadvantages of corona, radio interference, inductive interference between p...Disadvantages of corona, radio interference, inductive interference between p...
Disadvantages of corona, radio interference, inductive interference between p...vishalgohel12195
 
Design, Planning and Layout of high voltage laboratory
Design, Planning and Layout of high voltage laboratory Design, Planning and Layout of high voltage laboratory
Design, Planning and Layout of high voltage laboratory vishalgohel12195
 

More from vishalgohel12195 (20)

Variable frequency drive and variable frequency control
Variable frequency drive and variable frequency controlVariable frequency drive and variable frequency control
Variable frequency drive and variable frequency control
 
Self control of synchronous motor drives
Self control of synchronous motor drivesSelf control of synchronous motor drives
Self control of synchronous motor drives
 
Owen’s bridge and measurement of increment inductance
Owen’s bridge and measurement of increment inductanceOwen’s bridge and measurement of increment inductance
Owen’s bridge and measurement of increment inductance
 
Initial and final condition for circuit
Initial and final condition for circuitInitial and final condition for circuit
Initial and final condition for circuit
 
FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS
FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS  FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS
FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS
 
Differential equations of first order
Differential equations of first orderDifferential equations of first order
Differential equations of first order
 
Cost for production including breaking analysis
Cost for production including breaking  analysisCost for production including breaking  analysis
Cost for production including breaking analysis
 
Concept of general terms pertaining to rotating machines
Concept of general terms pertaining to rotating machinesConcept of general terms pertaining to rotating machines
Concept of general terms pertaining to rotating machines
 
Transfer function and mathematical modeling
Transfer  function  and  mathematical  modelingTransfer  function  and  mathematical  modeling
Transfer function and mathematical modeling
 
armature Winding
armature Windingarmature Winding
armature Winding
 
Switching regulators
Switching regulatorsSwitching regulators
Switching regulators
 
Sag in overhead transmission line, sag calculation & string chart
Sag in overhead transmission line, sag   calculation & string chartSag in overhead transmission line, sag   calculation & string chart
Sag in overhead transmission line, sag calculation & string chart
 
Rectifier
RectifierRectifier
Rectifier
 
Protection against overvoltage
Protection against overvoltageProtection against overvoltage
Protection against overvoltage
 
Pantograph,catenary wire,smothing reactor
Pantograph,catenary wire,smothing reactorPantograph,catenary wire,smothing reactor
Pantograph,catenary wire,smothing reactor
 
On load tap changer in a.c. locomotive transformer & air blast circuit b...
On load tap changer in a.c. locomotive transformer  & air blast circuit b...On load tap changer in a.c. locomotive transformer  & air blast circuit b...
On load tap changer in a.c. locomotive transformer & air blast circuit b...
 
Logical instruction of 8085
Logical instruction of 8085Logical instruction of 8085
Logical instruction of 8085
 
Effect of non sinusoidal waveform of a.c. machine performance
Effect of non sinusoidal waveform of a.c. machine performanceEffect of non sinusoidal waveform of a.c. machine performance
Effect of non sinusoidal waveform of a.c. machine performance
 
Disadvantages of corona, radio interference, inductive interference between p...
Disadvantages of corona, radio interference, inductive interference between p...Disadvantages of corona, radio interference, inductive interference between p...
Disadvantages of corona, radio interference, inductive interference between p...
 
Design, Planning and Layout of high voltage laboratory
Design, Planning and Layout of high voltage laboratory Design, Planning and Layout of high voltage laboratory
Design, Planning and Layout of high voltage laboratory
 

Recently uploaded

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 

Traditional problem associated with cyber crime

  • 1.
  • 2.  What is cyber crime?  Cyber crime variants  Phishing  Cyber stalking  vishing
  • 3. • Any offence against morality, social order or any unjust or shameful act. • “Offence" -in the Code of Criminal Procedure to mean as an act or omission made punishable by any law for the time being in force. • Cyber Crime is emerging as a serious threat. World wide governments, police departments and intelligence units have started to react.
  • 4. Cyber Crime Variants •Hacking Hacking is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year. •Cyber Squatting Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune.
  • 5. •Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. •Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. •The fraudster then has access to the customer's online bank account and to the funds contained in that account.
  • 6.  Spear phishing  Clone phishing  whaling
  • 7. Cyber stalking •Cyber Stalking is use of the Internet or other electronic means to stalk someone. •This term is used interchangeably with online harassment and online abuse. • Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. Friday, 22 July 2016
  • 8. •Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward. • The term is a combination of “Voice" and phishing. • Vishing exploits the public's trust in landline telephone services. •Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals. VISHING Friday, 22 July 2016
  • 9. Decrease in broken software = Increase in good software CyberSecurity CyberCrime VS Graph - two sides of the same coin
  • 10. The Coin : Broken/Complex Software Cyber Security : One side of the coin Cyber Crime : Other side of the coin