SlideShare a Scribd company logo
1 of 27
CYBER CRIME
CYBER FORENSICS
&
What is Cyber Crime ?
Cyber Crime is nothing but
where the computer used as
an object or subject of
crime..
Cyber Crime is nothing but where the
computer used as an object or subject of
crime…
HISTORY OF CYBER CRIME
 The first recorded cyber crime took place in the year
1820.
 The first spam email took place in 1976 when it was
sent out over the ARPANET.
 The first virus was installed on an Apple computer in
1982.
CATEGORIES OF CYBER CRIME
Using a computer to commit real world crime
e.g. cyber terrorism, credit card fraud, cyber bullying etc.
Using a computer to attack other computers
e.g. Hacking, virus/worms attacks, software piracy etc.
Individuals Property Government
TYPES OF CYBER CRIME
Hacking in simple
terms means an
illegal intrusion into a
computer system
without permission
of the owner/user.
It is also known as
CRACKING. It is use of the
Internet or other
electronic means to
bully and stalk
someone. These
terms are used
interchangeably with
online harassment
and online abuse.
It is a process of a
Malicious software that
attaches itself to other
software.
(Virus , Worms, Trojan
Horse ,Web Jacking, E-
mail Bombing Etc.) An attack which floods a computer
or website with data, causing it to
overload and prevent it from
functioning properly. It is an explicit
attempt by attackers to deny service
to intended users of that service.
It is the use of the Internet
to conduct violent acts that
result in, or threaten, loss of
life or significant bodily
harm. use of Internet based
attacks in terrorist activities.
Damaging or destroying data rather
than stealing or misusing them is
called cyber vandalism.
Identity theft occurs when a criminal
gains access to our personal information
(such as our name, address, date of birth
or bank account details) to steal money
or gain other benefits. Also known as
identity fraud.
Software piracy is the unauthorised use
and distribution of computer software.
A spoofed email is one
that appears to
originate from one
source but actually has
been sent from another
source.
This a technique of extracting
confidential information such as credit
card numbers and username-
password by masquerading as a
legitimate enterprise.
It is a way that criminals trick people
into giving out their personal or
financial details.
Spam is electronic junk
mail – unsolicited
messages sent by email,
text message without
the recipient’s consent..
 Vishing is the criminal practice
of using social engineering and
Voice over IP(VoIP) to gain
access to private personal and financial information
from the public for the purpose of financial reward.
 Vishing is typically used to steal credit card numbers or
other information used in identity theft schemes from
individuals.
India stands 11th in the ranking for Cyber Crime in the
World, constituting 3% of the Global Cyber Crime.
Increasing rate of cyber crime cases
WAYS TO PREVENT CYBER CRIME
Never disclose your personal information publicly on websites.
Always avoid sending any photograph online particularly to strangers .
Never enter your credit card number to any site that is not secured, to prevent its misuse.
Always use latest and updated Antivirus software to guard against virus attacks.
To prevent loss of data due to virus attacks, always keep back up of your data.
Website owners should watch traffic and check any irregularity on the site.
Use of firewalls proves beneficial.
Cyber forensics is the
science of collecting,
examining, analyzing
and reporting
electronic evidence.
It is an electronic
discovery technique
used to determine and
reveal technical
criminal evidence.
CYBER FORENSICS
Networks(Network Forensics)
Small Scale Digital Devices
Storage Media
Code Analysis
When dealing with digital evidence, all of the general
forensics and procedural principles must be applied.
Upon seizing digital evidence, actions taken should not
change that evidence.
When it is necessary for a person to access original
digital evidence, that person should be trained for that
purpose.
An individual is responsible for all actions taken with
respect to digital evidence.
1.READINESS
2.EVALUATION
3.COLLECTION 6.REVIEW
5.PRESENTATION
4.ANALYSIS
Intellectual Property Theft
Employment Disputes
Fraud Investigations
Forgeries
Bankruptcy Investigations
Inappropriate email and
internet use in the work place
Regulatory Compliance
CrowdStrike CrowdResponse
XplicoFTK Imager
VolatilitySANS SIFT
The Sleth Kit
Encryption
Increasing Storage Space
New Technologies
Anti-Forensics
Legal Issues
Administrative Issues
Though not all people are victims to cyber crimes, they are
still at risk.
Crimes by computer vary, and they don’t always occur
behind the computer, but they executed by computer.
The forensic examination of electronic systems has
undoubtedly been a huge success in the identification of
cyber and computer-assisted crime. Computer forensics is
an invaluable tool in the process.
Cybercrime And  Cyber forensics

More Related Content

What's hot

computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologiesurjarathi
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - NotesKranthi
 

What's hot (20)

computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 

Similar to Cybercrime And Cyber forensics

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security BasitShah18
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
tanishq comp ppt.pptx
tanishq comp ppt.pptxtanishq comp ppt.pptx
tanishq comp ppt.pptxGoyalrecipies
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 

Similar to Cybercrime And Cyber forensics (20)

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
tanishq comp ppt.pptx
tanishq comp ppt.pptxtanishq comp ppt.pptx
tanishq comp ppt.pptx
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 

Cybercrime And Cyber forensics

  • 2.
  • 3. What is Cyber Crime ?
  • 4. Cyber Crime is nothing but where the computer used as an object or subject of crime.. Cyber Crime is nothing but where the computer used as an object or subject of crime…
  • 5. HISTORY OF CYBER CRIME  The first recorded cyber crime took place in the year 1820.  The first spam email took place in 1976 when it was sent out over the ARPANET.  The first virus was installed on an Apple computer in 1982.
  • 6. CATEGORIES OF CYBER CRIME Using a computer to commit real world crime e.g. cyber terrorism, credit card fraud, cyber bullying etc. Using a computer to attack other computers e.g. Hacking, virus/worms attacks, software piracy etc. Individuals Property Government
  • 7.
  • 8.
  • 10. Hacking in simple terms means an illegal intrusion into a computer system without permission of the owner/user. It is also known as CRACKING. It is use of the Internet or other electronic means to bully and stalk someone. These terms are used interchangeably with online harassment and online abuse.
  • 11. It is a process of a Malicious software that attaches itself to other software. (Virus , Worms, Trojan Horse ,Web Jacking, E- mail Bombing Etc.) An attack which floods a computer or website with data, causing it to overload and prevent it from functioning properly. It is an explicit attempt by attackers to deny service to intended users of that service.
  • 12. It is the use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm. use of Internet based attacks in terrorist activities. Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.
  • 13. Identity theft occurs when a criminal gains access to our personal information (such as our name, address, date of birth or bank account details) to steal money or gain other benefits. Also known as identity fraud. Software piracy is the unauthorised use and distribution of computer software.
  • 14. A spoofed email is one that appears to originate from one source but actually has been sent from another source. This a technique of extracting confidential information such as credit card numbers and username- password by masquerading as a legitimate enterprise. It is a way that criminals trick people into giving out their personal or financial details. Spam is electronic junk mail – unsolicited messages sent by email, text message without the recipient’s consent..
  • 15.  Vishing is the criminal practice of using social engineering and Voice over IP(VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward.  Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.
  • 16. India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime.
  • 17. Increasing rate of cyber crime cases
  • 18. WAYS TO PREVENT CYBER CRIME Never disclose your personal information publicly on websites. Always avoid sending any photograph online particularly to strangers . Never enter your credit card number to any site that is not secured, to prevent its misuse. Always use latest and updated Antivirus software to guard against virus attacks. To prevent loss of data due to virus attacks, always keep back up of your data. Website owners should watch traffic and check any irregularity on the site. Use of firewalls proves beneficial.
  • 19. Cyber forensics is the science of collecting, examining, analyzing and reporting electronic evidence. It is an electronic discovery technique used to determine and reveal technical criminal evidence. CYBER FORENSICS
  • 20. Networks(Network Forensics) Small Scale Digital Devices Storage Media Code Analysis
  • 21. When dealing with digital evidence, all of the general forensics and procedural principles must be applied. Upon seizing digital evidence, actions taken should not change that evidence. When it is necessary for a person to access original digital evidence, that person should be trained for that purpose. An individual is responsible for all actions taken with respect to digital evidence.
  • 23. Intellectual Property Theft Employment Disputes Fraud Investigations Forgeries Bankruptcy Investigations Inappropriate email and internet use in the work place Regulatory Compliance
  • 25. Encryption Increasing Storage Space New Technologies Anti-Forensics Legal Issues Administrative Issues
  • 26. Though not all people are victims to cyber crimes, they are still at risk. Crimes by computer vary, and they don’t always occur behind the computer, but they executed by computer. The forensic examination of electronic systems has undoubtedly been a huge success in the identification of cyber and computer-assisted crime. Computer forensics is an invaluable tool in the process.