SlideShare a Scribd company logo
• CYBERCRIME IS ANY CRIMINAL ACTIVITY THAT
INVOLVES A COMPUTER, NETWORKED DEVICE OR A
NETWORK.
• MOST, BUT NOT ALL, CYBERCRIME IS COMMITTED BY
CYBERCRIMINALS OR HACKERS WHO WANT TO MAKE
MONEY. CYBERCRIME IS CARRIED OUT BY INDIVIDUALS
OR ORGANIZATIONS.
• SOME CYBERCRIMINALS ARE ORGANIZED, USE
ADVANCED TECHNIQUES AND ARE HIGHLY TECHNICALLY
SKILLED. OTHERS ARE NOVICE HACKERS.
• RARELY, CYBERCRIME AIMS TO DAMAGE COMPUTERS
FOR REASONS OTHER THAN PROFIT. THESE COULD BE
POLITICAL OR PERSONAL.
Cyberextortion: A crime involving an attack or threat of an
attack coupled with a demand for money to stop the attack.
Cryptojacking: An attack that uses scripts to mine
cryptocurrencies within browsers without the user's consent.
Software piracy: An attack that involves the unlawful copying,
distribution and use of software programs with the intention of
commercial or personal use.
Credit card fraud: An attack that occurs when hackers
infiltrate retailers' systems to get the credit card and/or banking
information of their customers.
Cyberespionage: A crime involving a cybercriminal who hacks
into systems or networks to gain access to confidential
information held by a government or other organization.
Exit scam: The dark web, not surprisingly, has given rise to the
digital version of an old crime known as the exit scam.
Identity theft: An attack that occurs when an individual
accesses a computer to glean a user's personal information,
which they then use to steal that person's identity or access their
valuable accounts, such as banking and credit cards.
EFFECTS OF CYBERCRIME ON ECONOMY• THE TRUE COST OF CYBERCRIME IS DIFFICULT TO ASSESS ACCURATELY.
• WHILE THE FINANCIAL LOSSES DUE TO CYBERCRIME CAN BE SIGNIFICANT, BUSINESSES CAN
ALSO SUFFER OTHER DISASTROUS CONSEQUENCES AS A RESULT OF CRIMINAL CYBERATTACKS,
INCLUDING THE FOLLOWING:
1. DAMAGE TO INVESTOR PERCEPTION AFTER A SECURITY BREACH CAN CAUSE A DROP IN THE
VALUE OF A COMPANY.
2. IN ADDITION TO POTENTIAL SHARE PRICE DROPS, BUSINESSES MAY ALSO FACE INCREASED
COSTS FOR BORROWING AND GREATER DIFFICULTY IN RAISING MORE CAPITALAS A RESULT
OF A CYBERATTACK.
3. LOSS OF SENSITIVE CUSTOMER DATA CAN RESULT IN FINES AND PENALTIES FOR COMPANIES
THAT HAVE FAILED TO PROTECT THEIR CUSTOMERS' DATA. BUSINESSES MAY ALSO BE SUED
OVER THE DATA BREACH.
4. DAMAGED BRAND IDENTITYAND LOSS OF REPUTATION AFTER A CYBERATTACK UNDERMINE
CUSTOMERS' TRUST IN A COMPANY AND THAT COMPANY'S ABILITY TO KEEP THEIR
FINANCIAL DATA SAFE. FOLLOWING A CYBERATTACK, FIRMS NOT ONLY LOSE CURRENT
CUSTOMERS, BUT THEY ALSO LOSE THE ABILITY TO GAIN NEW CUSTOMERS.
5. BUSINESSES MAY ALSO INCUR DIRECT COSTS FROM A CRIMINAL CYBERATTACK, INCLUDING
INCREASED INSURANCE PREMIUM COSTS AND THE COST OF HIRING CYBERSECURITY
COMPANIES TO DO INCIDENT RESPONSE AND REMEDIATION, AS WELL AS PUBLIC RELATIONS
(PR) AND OTHER SERVICES RELATED TO AN ATTACK.
CASE STUDY ON CYBER CRIME
IN MAY 2020, ACCORDING TO THE CYBERCRIME CASE STUDY, SOMEONE LOGGED ONTO THE WEBSITE UNDER
THE IDENTITY OF BARBARA CAMPAAND ORDERED A SONY COLOUR TELEVISION SET AND A CORDLESS
HEADPHONE. SHE GAVE HER CREDIT CARD NUMBER FOR PAYMENTAND REQUESTED THE PRODUCTS TO BE
DELIVERED TO ARIF AZIM IN NOIDA. THE PAYMENT WAS DULY CLEARED BY THE CREDIT CARD AGENCY, AND
THE TRANSACTION WAS PROCESSED. AFTER FOLLOWING THE RELEVANT PROCEDURES OF DUE DILIGENCE
AND CHECKING, THE COMPANY DELIVERED THE ITEMS TO ARIF AZIM.
THOUGH AT THE TIME OF DELIVERY, THE COMPANY TOOK DIGITAL PHOTOGRAPHS SHOWING THE DELIVERY
BEING ACCEPTED BY ARIF AZIM. THE TRANSACTION CLOSED AT THAT, BUT AFTER ONE AND A HALF MONTHS
THE CREDIT CARD AGENCY INFORMED THE COMPANY THAT THIS WAS AN UNAUTHORIZED TRANSACTION AS
THE REAL OWNER HAD DENIED HAVING MADE THE PURCHASE. THIS IS AN EXAMPLE OF CREDIT CARD FRAUD.
FURTHER SUCH EXAMPLES HAVE AN ADVERSE EFFECT ON THE CUSTOMERS BUYING PRODUCTS ONLINE. SO,
THESE CUSTOMERS THINK 10 TIMES BEFORE PURCHASING ANY PRODUCT ONLINE. THEREFORE THIS AFFECTS
THE ECONOMYAS ONLINE CUSTOMERS REDUCE DUE TO SUCH INCIDENTS.

More Related Content

What's hot

CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
Sharique Masood
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
himanshujoshi238
 
Ppt
PptPpt
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
Akhilesh Patel
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Avinash
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
AariyaRathi
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
Dr. Hemant Kumar Singh
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
HACKING
HACKINGHACKING
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
Hacking
Hacking Hacking
Hacking
Farkhanda Kiran
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
Prof .Pragati Khade
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
Harsh Bhanushali
 

What's hot (20)

CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ppt
PptPpt
Ppt
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
HACKING
HACKINGHACKING
HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 

Similar to Types of cyber crime

Cyber.ppt
Cyber.pptCyber.ppt
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Cyber breach at target.pptx
Cyber breach at target.pptxCyber breach at target.pptx
Cyber breach at target.pptx
VarunLala2
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
Entrance Exam Info
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
Michael Holden
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
OilPriceInformationService
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
Semir Ibrahimovic
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
Semir Ibrahimovic
 
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and Oman
Mubarak Al Hadadi
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
Management Insights LLC
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
Eric Reehl
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
Bolaji James Bankole CCSS,CEH,MCSA,MCSE,MCP,CCNA,
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
BrianHuntMSFCPACRISC
 
Cyber_Crime[1][1].pptx
Cyber_Crime[1][1].pptxCyber_Crime[1][1].pptx
Cyber_Crime[1][1].pptx
MohitMaurya57
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Unlocking New Doorways to Multi-channel Scams
Unlocking New Doorways to Multi-channel ScamsUnlocking New Doorways to Multi-channel Scams
Unlocking New Doorways to Multi-channel Scams
CTM360
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
OmprakashRaut
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
amani kadope
 
Cybercrime
CybercrimeCybercrime
Cybercrime
deepika28g
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industry
itio Innovex Pvt Ltv
 

Similar to Types of cyber crime (20)

Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cyber breach at target.pptx
Cyber breach at target.pptxCyber breach at target.pptx
Cyber breach at target.pptx
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and Oman
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
Cyber_Crime[1][1].pptx
Cyber_Crime[1][1].pptxCyber_Crime[1][1].pptx
Cyber_Crime[1][1].pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Unlocking New Doorways to Multi-channel Scams
Unlocking New Doorways to Multi-channel ScamsUnlocking New Doorways to Multi-channel Scams
Unlocking New Doorways to Multi-channel Scams
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industry
 

Recently uploaded

Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 

Recently uploaded (20)

Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 

Types of cyber crime

  • 1. • CYBERCRIME IS ANY CRIMINAL ACTIVITY THAT INVOLVES A COMPUTER, NETWORKED DEVICE OR A NETWORK. • MOST, BUT NOT ALL, CYBERCRIME IS COMMITTED BY CYBERCRIMINALS OR HACKERS WHO WANT TO MAKE MONEY. CYBERCRIME IS CARRIED OUT BY INDIVIDUALS OR ORGANIZATIONS. • SOME CYBERCRIMINALS ARE ORGANIZED, USE ADVANCED TECHNIQUES AND ARE HIGHLY TECHNICALLY SKILLED. OTHERS ARE NOVICE HACKERS. • RARELY, CYBERCRIME AIMS TO DAMAGE COMPUTERS FOR REASONS OTHER THAN PROFIT. THESE COULD BE POLITICAL OR PERSONAL.
  • 2. Cyberextortion: A crime involving an attack or threat of an attack coupled with a demand for money to stop the attack. Cryptojacking: An attack that uses scripts to mine cryptocurrencies within browsers without the user's consent. Software piracy: An attack that involves the unlawful copying, distribution and use of software programs with the intention of commercial or personal use. Credit card fraud: An attack that occurs when hackers infiltrate retailers' systems to get the credit card and/or banking information of their customers. Cyberespionage: A crime involving a cybercriminal who hacks into systems or networks to gain access to confidential information held by a government or other organization.
  • 3. Exit scam: The dark web, not surprisingly, has given rise to the digital version of an old crime known as the exit scam. Identity theft: An attack that occurs when an individual accesses a computer to glean a user's personal information, which they then use to steal that person's identity or access their valuable accounts, such as banking and credit cards.
  • 4. EFFECTS OF CYBERCRIME ON ECONOMY• THE TRUE COST OF CYBERCRIME IS DIFFICULT TO ASSESS ACCURATELY. • WHILE THE FINANCIAL LOSSES DUE TO CYBERCRIME CAN BE SIGNIFICANT, BUSINESSES CAN ALSO SUFFER OTHER DISASTROUS CONSEQUENCES AS A RESULT OF CRIMINAL CYBERATTACKS, INCLUDING THE FOLLOWING: 1. DAMAGE TO INVESTOR PERCEPTION AFTER A SECURITY BREACH CAN CAUSE A DROP IN THE VALUE OF A COMPANY. 2. IN ADDITION TO POTENTIAL SHARE PRICE DROPS, BUSINESSES MAY ALSO FACE INCREASED COSTS FOR BORROWING AND GREATER DIFFICULTY IN RAISING MORE CAPITALAS A RESULT OF A CYBERATTACK. 3. LOSS OF SENSITIVE CUSTOMER DATA CAN RESULT IN FINES AND PENALTIES FOR COMPANIES THAT HAVE FAILED TO PROTECT THEIR CUSTOMERS' DATA. BUSINESSES MAY ALSO BE SUED OVER THE DATA BREACH. 4. DAMAGED BRAND IDENTITYAND LOSS OF REPUTATION AFTER A CYBERATTACK UNDERMINE CUSTOMERS' TRUST IN A COMPANY AND THAT COMPANY'S ABILITY TO KEEP THEIR FINANCIAL DATA SAFE. FOLLOWING A CYBERATTACK, FIRMS NOT ONLY LOSE CURRENT CUSTOMERS, BUT THEY ALSO LOSE THE ABILITY TO GAIN NEW CUSTOMERS. 5. BUSINESSES MAY ALSO INCUR DIRECT COSTS FROM A CRIMINAL CYBERATTACK, INCLUDING INCREASED INSURANCE PREMIUM COSTS AND THE COST OF HIRING CYBERSECURITY COMPANIES TO DO INCIDENT RESPONSE AND REMEDIATION, AS WELL AS PUBLIC RELATIONS (PR) AND OTHER SERVICES RELATED TO AN ATTACK.
  • 5. CASE STUDY ON CYBER CRIME IN MAY 2020, ACCORDING TO THE CYBERCRIME CASE STUDY, SOMEONE LOGGED ONTO THE WEBSITE UNDER THE IDENTITY OF BARBARA CAMPAAND ORDERED A SONY COLOUR TELEVISION SET AND A CORDLESS HEADPHONE. SHE GAVE HER CREDIT CARD NUMBER FOR PAYMENTAND REQUESTED THE PRODUCTS TO BE DELIVERED TO ARIF AZIM IN NOIDA. THE PAYMENT WAS DULY CLEARED BY THE CREDIT CARD AGENCY, AND THE TRANSACTION WAS PROCESSED. AFTER FOLLOWING THE RELEVANT PROCEDURES OF DUE DILIGENCE AND CHECKING, THE COMPANY DELIVERED THE ITEMS TO ARIF AZIM. THOUGH AT THE TIME OF DELIVERY, THE COMPANY TOOK DIGITAL PHOTOGRAPHS SHOWING THE DELIVERY BEING ACCEPTED BY ARIF AZIM. THE TRANSACTION CLOSED AT THAT, BUT AFTER ONE AND A HALF MONTHS THE CREDIT CARD AGENCY INFORMED THE COMPANY THAT THIS WAS AN UNAUTHORIZED TRANSACTION AS THE REAL OWNER HAD DENIED HAVING MADE THE PURCHASE. THIS IS AN EXAMPLE OF CREDIT CARD FRAUD. FURTHER SUCH EXAMPLES HAVE AN ADVERSE EFFECT ON THE CUSTOMERS BUYING PRODUCTS ONLINE. SO, THESE CUSTOMERS THINK 10 TIMES BEFORE PURCHASING ANY PRODUCT ONLINE. THEREFORE THIS AFFECTS THE ECONOMYAS ONLINE CUSTOMERS REDUCE DUE TO SUCH INCIDENTS.