SlideShare a Scribd company logo
WHAT IS CYBER CRIME?
IDENTITY THEFT
• IDENTITY THEFT MEANS STEALING SOMEONE ELSE IDENTITY SUCH
AS SOCIAL SECURITY NUMBER, DATE-OF-BIRTH, DRIVING LICENSE
NUMBER TO COMMIT FRAUDS SUCH AS BANK FRAUDS, CREDIT
CARD FRAUD ETC. IDENTITY THIEVES CAN GO AHEAD TO PERFORM
MORE SERIOUS CRIMES SUCH AS SMUGGLING, TRAFFICKING DRUGS
ETC. LEARN HOW TO PREVENT IDENTITY THEFT.
CYBERSTALKING
• CYBERSTALKING IS HARASSING AN INDIVIDUAL OR A GROUP VIA
THE INTERNET.
• A CYBER STALKER CAN GO TO THE EXTENT OF MAKING PERSONAL
INFORMATION OF A USER PUBLIC ON SOCIAL SITES.
• CYBERSTALKING IS A SERIOUS CRIME AND ATTRACTS SEVERE
PUNISHMENT IN SOME COUNTRIES.
PHISHING ATTACK
• PHISHING IS AN INCREASING THREAT WHICH AFFECTS THOUSANDS
OF INTERNET USERS EVERY DAY.
• THIS IS A TECHNIQUE USED BY CYBER CRIMINALS TO STEAL
PASSWORDS, LOGIN DETAILS OF INTERNET USERS.
• CYBER CROOKS TRICK THE INTERNET USERS TO PHISHING SITES
RESEMBLING A BANK OR A SHOPPING SITE, WHERE EVERY DETAIL
ENTERED IS FETCHED BY THE PHISHER.
CHILD SOLICITING AND ABUSE
• THIS IS A TYPE OF CYBERCRIME, WHERE MINORS ARE SOLICITED VIA
CHAT ROOMS TO ENGAGE THEM INTO PORNOGRAPHY.
• LAWS REGARDING CHILD PORNOGRAPHY IS VERY STRICT AND
INVOLVES SEVERE PUNISHMENT IN SEVERAL COUNTRIES.
RUNNING EMAIL SPAM
• MOST PEOPLE ARE UNAWARE THAT RUNNING SPAM IS A TYPE OF
CYBERCRIME. THOSE WHO ARE INVOLVED IN SENDING SPAM
MESSAGES, COLLECTS EMAIL ADDRESS OF USERS FROM SOCIAL
SITES AND CHATROOMS AND SEND SPAM MESSAGES.
• THESE MESSAGES CONTAINS LINKS, CLICKING ON WHICH THE USER
MAY LAND TO A WEBSITE, WHERE HE WILL BE MOTIVATED TO MAKE
A PURCHASE OR ENTER THEIR PERSONAL INFORMATION.
THANK YOU!
FOR MORE, PLEASE VISIT- WWW.REVEANTIVIRUS.COM

More Related Content

Viewers also liked

Balancing parental control and child independence
Balancing parental control and child independenceBalancing parental control and child independence
Balancing parental control and child independence
kanika sharma
 
Frdm
FrdmFrdm
Frdm
FRDM
 
4Growth Large Opportunity Validation System
4Growth Large Opportunity Validation System4Growth Large Opportunity Validation System
4Growth Large Opportunity Validation System
David Sharples
 
GXYSearch: job seeking advice
GXYSearch: job seeking adviceGXYSearch: job seeking advice
GXYSearch: job seeking adviceJoanne Spain
 
Edisi15oktnasional
Edisi15oktnasionalEdisi15oktnasional
Edisi15oktnasionalepaper
 
Vim Cards - Keynote Format
Vim Cards - Keynote FormatVim Cards - Keynote Format
Vim Cards - Keynote Format
Adam Lowe
 
Waspada Nasional 2 September 2009
Waspada Nasional 2 September 2009Waspada Nasional 2 September 2009
Waspada Nasional 2 September 2009epaper
 
Project UpCity - Local Phase Report
Project UpCity - Local Phase ReportProject UpCity - Local Phase Report
Project UpCity - Local Phase Report
Adi Buzgar
 
29des N As
29des N As29des N As
29des N Asepaper
 
Aiesec 2008 2009 Report For Sandora
Aiesec 2008 2009 Report For SandoraAiesec 2008 2009 Report For Sandora
Aiesec 2008 2009 Report For SandoraAnastasiya Avdeyeva
 
Universiteit Antwerpen Europese Handelspartners Ken Lawrence
Universiteit Antwerpen Europese Handelspartners Ken LawrenceUniversiteit Antwerpen Europese Handelspartners Ken Lawrence
Universiteit Antwerpen Europese Handelspartners Ken LawrenceThisco
 
Players practice question modelling exercise
Players practice question modelling exercisePlayers practice question modelling exercise
Players practice question modelling exercisedouglasgreig
 
Edisi29oktnas
Edisi29oktnasEdisi29oktnas
Edisi29oktnasepaper
 
Edisi16oktnasional
Edisi16oktnasionalEdisi16oktnasional
Edisi16oktnasionalepaper
 
1 Personality Development Notes
1 Personality Development Notes1 Personality Development Notes
1 Personality Development Notessahilsahil992
 
Edisi 28 Nas
Edisi 28 NasEdisi 28 Nas
Edisi 28 Nasepaper
 
Universiteit Antwerpen Eindverhandeling Ken Lawrence
Universiteit Antwerpen Eindverhandeling Ken LawrenceUniversiteit Antwerpen Eindverhandeling Ken Lawrence
Universiteit Antwerpen Eindverhandeling Ken LawrenceThisco
 
Binder22
Binder22Binder22
Binder22epaper
 
Edisi 16 april nas
Edisi 16 april nasEdisi 16 april nas
Edisi 16 april nasepaper
 

Viewers also liked (20)

Balancing parental control and child independence
Balancing parental control and child independenceBalancing parental control and child independence
Balancing parental control and child independence
 
Frdm
FrdmFrdm
Frdm
 
4Growth Large Opportunity Validation System
4Growth Large Opportunity Validation System4Growth Large Opportunity Validation System
4Growth Large Opportunity Validation System
 
GXYSearch: job seeking advice
GXYSearch: job seeking adviceGXYSearch: job seeking advice
GXYSearch: job seeking advice
 
Edisi15oktnasional
Edisi15oktnasionalEdisi15oktnasional
Edisi15oktnasional
 
TESTANDO
TESTANDOTESTANDO
TESTANDO
 
Vim Cards - Keynote Format
Vim Cards - Keynote FormatVim Cards - Keynote Format
Vim Cards - Keynote Format
 
Waspada Nasional 2 September 2009
Waspada Nasional 2 September 2009Waspada Nasional 2 September 2009
Waspada Nasional 2 September 2009
 
Project UpCity - Local Phase Report
Project UpCity - Local Phase ReportProject UpCity - Local Phase Report
Project UpCity - Local Phase Report
 
29des N As
29des N As29des N As
29des N As
 
Aiesec 2008 2009 Report For Sandora
Aiesec 2008 2009 Report For SandoraAiesec 2008 2009 Report For Sandora
Aiesec 2008 2009 Report For Sandora
 
Universiteit Antwerpen Europese Handelspartners Ken Lawrence
Universiteit Antwerpen Europese Handelspartners Ken LawrenceUniversiteit Antwerpen Europese Handelspartners Ken Lawrence
Universiteit Antwerpen Europese Handelspartners Ken Lawrence
 
Players practice question modelling exercise
Players practice question modelling exercisePlayers practice question modelling exercise
Players practice question modelling exercise
 
Edisi29oktnas
Edisi29oktnasEdisi29oktnas
Edisi29oktnas
 
Edisi16oktnasional
Edisi16oktnasionalEdisi16oktnasional
Edisi16oktnasional
 
1 Personality Development Notes
1 Personality Development Notes1 Personality Development Notes
1 Personality Development Notes
 
Edisi 28 Nas
Edisi 28 NasEdisi 28 Nas
Edisi 28 Nas
 
Universiteit Antwerpen Eindverhandeling Ken Lawrence
Universiteit Antwerpen Eindverhandeling Ken LawrenceUniversiteit Antwerpen Eindverhandeling Ken Lawrence
Universiteit Antwerpen Eindverhandeling Ken Lawrence
 
Binder22
Binder22Binder22
Binder22
 
Edisi 16 april nas
Edisi 16 april nasEdisi 16 april nas
Edisi 16 april nas
 

Similar to What is cyber crime

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
vishalgohel12195
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Shareb Ismaeel
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
kirupasuchi1996
 
cyber crime
cyber crimecyber crime
cyber crime
Akash Mehta
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
Devanshi Solanki
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
Arindam Sarkar
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
ChrisSosaJacob
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Fraz Ali
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Fit Tri
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
udhaya jeni
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
MarioTalavera10
 

Similar to What is cyber crime (20)

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber safety
Cyber  safetyCyber  safety
Cyber safety
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 

More from kanika sharma

5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing
kanika sharma
 
Top 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketingTop 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketing
kanika sharma
 
Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?
kanika sharma
 
7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks
kanika sharma
 
10 Tips to Secure Your Password
10 Tips to Secure Your Password10 Tips to Secure Your Password
10 Tips to Secure Your Password
kanika sharma
 
Security threats for SME's
Security threats for SME'sSecurity threats for SME's
Security threats for SME's
kanika sharma
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
kanika sharma
 
Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should know
kanika sharma
 
Safety tips when using a public computer
Safety tips when using a public computerSafety tips when using a public computer
Safety tips when using a public computer
kanika sharma
 
What are bad passwords?
What are bad passwords?What are bad passwords?
What are bad passwords?
kanika sharma
 
Top 5 website security myths
Top 5 website security mythsTop 5 website security myths
Top 5 website security myths
kanika sharma
 
6 interesting things to know about Bad Rabbit Ransomware
6 interesting things to know about Bad Rabbit Ransomware6 interesting things to know about Bad Rabbit Ransomware
6 interesting things to know about Bad Rabbit Ransomware
kanika sharma
 
Favorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile usersFavorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile users
kanika sharma
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
kanika sharma
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
kanika sharma
 
don’t forget to keep these 5 Travel items
 don’t forget to keep these 5 Travel items don’t forget to keep these 5 Travel items
don’t forget to keep these 5 Travel items
kanika sharma
 
Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –
kanika sharma
 
Japan travel – do you know these 11
Japan travel – do you know these 11Japan travel – do you know these 11
Japan travel – do you know these 11
kanika sharma
 
Device security Tips
Device security TipsDevice security Tips
Device security Tips
kanika sharma
 
How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safe
kanika sharma
 

More from kanika sharma (20)

5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing
 
Top 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketingTop 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketing
 
Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?
 
7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks
 
10 Tips to Secure Your Password
10 Tips to Secure Your Password10 Tips to Secure Your Password
10 Tips to Secure Your Password
 
Security threats for SME's
Security threats for SME'sSecurity threats for SME's
Security threats for SME's
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should know
 
Safety tips when using a public computer
Safety tips when using a public computerSafety tips when using a public computer
Safety tips when using a public computer
 
What are bad passwords?
What are bad passwords?What are bad passwords?
What are bad passwords?
 
Top 5 website security myths
Top 5 website security mythsTop 5 website security myths
Top 5 website security myths
 
6 interesting things to know about Bad Rabbit Ransomware
6 interesting things to know about Bad Rabbit Ransomware6 interesting things to know about Bad Rabbit Ransomware
6 interesting things to know about Bad Rabbit Ransomware
 
Favorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile usersFavorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile users
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
don’t forget to keep these 5 Travel items
 don’t forget to keep these 5 Travel items don’t forget to keep these 5 Travel items
don’t forget to keep these 5 Travel items
 
Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –
 
Japan travel – do you know these 11
Japan travel – do you know these 11Japan travel – do you know these 11
Japan travel – do you know these 11
 
Device security Tips
Device security TipsDevice security Tips
Device security Tips
 
How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safe
 

Recently uploaded

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 

Recently uploaded (20)

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 

What is cyber crime

  • 1. WHAT IS CYBER CRIME?
  • 2. IDENTITY THEFT • IDENTITY THEFT MEANS STEALING SOMEONE ELSE IDENTITY SUCH AS SOCIAL SECURITY NUMBER, DATE-OF-BIRTH, DRIVING LICENSE NUMBER TO COMMIT FRAUDS SUCH AS BANK FRAUDS, CREDIT CARD FRAUD ETC. IDENTITY THIEVES CAN GO AHEAD TO PERFORM MORE SERIOUS CRIMES SUCH AS SMUGGLING, TRAFFICKING DRUGS ETC. LEARN HOW TO PREVENT IDENTITY THEFT.
  • 3. CYBERSTALKING • CYBERSTALKING IS HARASSING AN INDIVIDUAL OR A GROUP VIA THE INTERNET. • A CYBER STALKER CAN GO TO THE EXTENT OF MAKING PERSONAL INFORMATION OF A USER PUBLIC ON SOCIAL SITES. • CYBERSTALKING IS A SERIOUS CRIME AND ATTRACTS SEVERE PUNISHMENT IN SOME COUNTRIES.
  • 4. PHISHING ATTACK • PHISHING IS AN INCREASING THREAT WHICH AFFECTS THOUSANDS OF INTERNET USERS EVERY DAY. • THIS IS A TECHNIQUE USED BY CYBER CRIMINALS TO STEAL PASSWORDS, LOGIN DETAILS OF INTERNET USERS. • CYBER CROOKS TRICK THE INTERNET USERS TO PHISHING SITES RESEMBLING A BANK OR A SHOPPING SITE, WHERE EVERY DETAIL ENTERED IS FETCHED BY THE PHISHER.
  • 5. CHILD SOLICITING AND ABUSE • THIS IS A TYPE OF CYBERCRIME, WHERE MINORS ARE SOLICITED VIA CHAT ROOMS TO ENGAGE THEM INTO PORNOGRAPHY. • LAWS REGARDING CHILD PORNOGRAPHY IS VERY STRICT AND INVOLVES SEVERE PUNISHMENT IN SEVERAL COUNTRIES.
  • 6. RUNNING EMAIL SPAM • MOST PEOPLE ARE UNAWARE THAT RUNNING SPAM IS A TYPE OF CYBERCRIME. THOSE WHO ARE INVOLVED IN SENDING SPAM MESSAGES, COLLECTS EMAIL ADDRESS OF USERS FROM SOCIAL SITES AND CHATROOMS AND SEND SPAM MESSAGES. • THESE MESSAGES CONTAINS LINKS, CLICKING ON WHICH THE USER MAY LAND TO A WEBSITE, WHERE HE WILL BE MOTIVATED TO MAKE A PURCHASE OR ENTER THEIR PERSONAL INFORMATION.
  • 7. THANK YOU! FOR MORE, PLEASE VISIT- WWW.REVEANTIVIRUS.COM