SlideShare a Scribd company logo
2
Most read
3
Most read
CRIMINOLOGY
TOPIC- CYBER CRIME
PREPARED BY - AFNAN HUSAIN
CLASS - SY LLB (SEM 4)
SEAT NO. - 40015
WHAT IS CYBER CRIME?
• A cyber crime may be defined as any illegal criminal activity
that uses a computer either as an instrumentality, target or
means of perpetrating further crime.
• In other words cyber crime is an unlawful act wherein the
computer is either a tool or a target or both.
• Cyber crime is any crime that takes place online or primarily
online. Cyber criminals often commit crimes by targeting
computer network and devices.
• Cyber crime can range from security breaches to identity theft,
and includes cyber stalking, harassment, bullying and child
sexual exploitation.
• Terrorists collaborate on the internet to carry out their illegal
activities in cyberspace. Cyber crime continues to evolve with
new threats surfacing all over the world.
• The distinction between cyber crime and conventional crime
lies in the involvement of the medium in cases of cyber crime.
That is, there should be involvement, at any stage, of the virtual
cyber medium in case of a cyber crime.
NATURE OF CYBER CRIME
• Cyber space and internet having developed as favourite
medium of carrying on wide range of activities, has at the same
time became an easy and convenient mode of committing cyber
crime the world over, which can be detected only with the
international co-operation of law enforcement agencies of
different countries.
• In April 2010, at the Twelfth UN Congress on Crime Prevention
and Criminal Justice held extensive discussion expressing
serious concern over the massive use of computer science and
technology by the perpetrators of cyber crime and measure to
be adopted by authorities in fighting against these crimes.
REASONS FOR CYBER CRIME
• The computer has the unique characteristic of storing data in a
relatively very small space.
• Computer are easy to access and therefore, unauthorised
access by the use of complex cyber space technology is easily
possible by passing security system.
• The computers work on operating system which are complex
and are composed of millions of codes. The cyber offenders
take advantage of this.
• One of the significant features of the computer system is that
evidence is destroyed in no time. The criminals find it very easy
to destroy the evidence soon after the crime is committed.
TYPES OF CYBER CRIME
• Hacking: Hacking in simple terms means an illegal intrusion
into a computer system and/or network.
• E- mail Spoofing: A spoofed e-mail may be said to be one
which misrepresents its origin. That is, it shows its origin to be
different from which it actually originates.
• Computer Vandalism: Any kind of physical damage done to the
computer of any person. It may be in the form of theft of a
computer or some part thereof.
• Cyber Terrorism: Cyber terrorism may be said to be a
convergence of terrorism and cyber space involving unlawful
attacks or threats of attacks against computers, networks, and
the information stored therein, in order to coerce or intimidate
a government or its people in furtherance of political, social, or
ideological objectives.
• Cyber Pornography: Computers and internet have opened new
flood gates for pornographic material being available on
websites which has adverse effect on moral health of
youngsters, particularly adolescents.
OTHER TYPES OF CYBER CRIMES
• Cyber Stalking
• Cyber Defamation
• E-mail Frauds
• Identity Theft
• Data Diddling
• Phishing
HOW TO AVOID BECOMING A VICTIM OF
CERTAIN TYPES OF CYBER CRIME
• Don’t enter private and confidential information on your
personal computer.
• Always use a firewall. Also, always use one or two anti-spyware
programs in addition to your anti-virus software, and keep
them up to date
• Don't reply to an email or pop-up message that asks for
personal or financial information, and don't click on links in the
message
• Store your information elsewhere apart from your PC like on a
flash disk or an external hard drive
• Download a safe search tool like SiteAdvisor which will advise
IMPACT OF CYBER CRIME
• The expansion of internet and computer all over the world has
generated a new species of crime commonly known as cyber
crimes. The areas most hit by the impact of these crimes is,
economy and security regimes because the alarmingly
expanding dimensions of cyber frauds and terrorists activities
of hardcore terrorists are ruining the nation’s economy and
posing a threat to the national security destroying its internal
and external peace.
• Looking to the international dimensions of these crimes and
jurisdictional problems between the countries and variations in
the cyber law, the electronic transaction and liability issues for
the acts executed in cyberspace still remain hazy and uncertain

More Related Content

PPTX
Cyber crime and security ppt
PPTX
Cyber Crime
PPT
PPT
Cybercrime presentation
PPTX
Diabetes Mellitus
PPTX
Hypertension
PPTX
Power Point Presentation on Artificial Intelligence
PPTX
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx
Cyber crime and security ppt
Cyber Crime
Cybercrime presentation
Diabetes Mellitus
Hypertension
Power Point Presentation on Artificial Intelligence
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx

What's hot (20)

PPTX
Cyber crime and Security
PPTX
cyber stalking
PPTX
CyberCrimes
PPTX
Cyber Crime
PPTX
PPSX
Cyber crime
PPTX
Cyber ethics
PPTX
Cyber Crime
PPT
Cyber crime and fraud
PPTX
Software piracy
PPTX
Cybercrime and Security
PPT
cyber ethics
PPTX
Cyber crime
PPTX
Cyber crime and security
DOC
Report of cyber crime
PPTX
Ethics In Information Technology
PDF
Cyber fraud in banks
PPTX
Digital arrest scam in India - A brief introduction
PDF
Cyber security awareness presentation nepal
PPTX
Cyber crime ppt
Cyber crime and Security
cyber stalking
CyberCrimes
Cyber Crime
Cyber crime
Cyber ethics
Cyber Crime
Cyber crime and fraud
Software piracy
Cybercrime and Security
cyber ethics
Cyber crime
Cyber crime and security
Report of cyber crime
Ethics In Information Technology
Cyber fraud in banks
Digital arrest scam in India - A brief introduction
Cyber security awareness presentation nepal
Cyber crime ppt
Ad

Similar to Cyber Crime (20)

PPT
Cyber Security and Cyber Awareness
PPT
CYBER CRIME AND SECURITY
PPTX
Cyber Crime
PPTX
PPTX
Cyber crime and security
PPTX
cyber-crimghgirrif8eieifififejwjdjes.pptx
PPTX
Cyber Security PPT and how to be aware from hackers
PPT
CYBER CRIME AND RETATED CONCEPTS PPT (sharmistha Bandyopadhyay, LL.M 4th Sem)...
PPTX
Cybercrimes
PPTX
Cyber crime
PPT
Cyber security 22-07-29=013
PPTX
Cybercrime
PPTX
Cybercrime
PPTX
cs computer notes of studies in education
PPTX
Cybercrime
PPTX
Cyber crime
PPTX
Cyber crime.pptx
PPTX
Cyber crime-140128140443-phpapp02 (1)
PPTX
Cyber crimes and its security
Cyber Security and Cyber Awareness
CYBER CRIME AND SECURITY
Cyber Crime
Cyber crime and security
cyber-crimghgirrif8eieifififejwjdjes.pptx
Cyber Security PPT and how to be aware from hackers
CYBER CRIME AND RETATED CONCEPTS PPT (sharmistha Bandyopadhyay, LL.M 4th Sem)...
Cybercrimes
Cyber crime
Cyber security 22-07-29=013
Cybercrime
Cybercrime
cs computer notes of studies in education
Cybercrime
Cyber crime
Cyber crime.pptx
Cyber crime-140128140443-phpapp02 (1)
Cyber crimes and its security
Ad

Recently uploaded (20)

PDF
alberts-2006-concurrent-trademark-use-in
PPTX
Rights_of_Undertrial_Prisoners_Presentation.pptx
PPTX
history of medicine and evolution through the periods
PDF
STATUTE-130-Pg2000.pdf Lei Magnitisk - Estados Unidos da América
PPTX
Moral-Theology-PRELIMS.pptxhshsjjwjwjjjk
PPTX
RESULTING TRUST AND THE PRESUMPTION OF ADVANCEMENT.pptx
PPTX
Unit-1: Historical Perspective: Constitutional Developments since 1858 to 1947
PPT
Over view on IPR and its components :ppt
PPT
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
PDF
The 5 Deadly Trademark Sins - AKA the Absolute Bars to Registration
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PDF
Notes on Plausibility - A Review of the English and EPO Cases
PPTX
Digital Security in Cyber Law and Mitigating Cyberxrimes
PPTX
Children_Rights_Full_Presentation_With_Images.pptx
DOCX
ADMINSITRATIVE LAW QUESTION PAPER QUESTION BANK.docx
PPTX
BIOETHICS powerpoint presentation to use
PPTX
medical ethics and professional misconduct ppt
PPTX
Lecture Notes on Family Law - Knowledge Area 5
PDF
AHRP LB - Quick Look of the Newly-initiated Koperasi Merah Putih (KMP).pdf
PPTX
Biotechnology and Bioethics for referenc
alberts-2006-concurrent-trademark-use-in
Rights_of_Undertrial_Prisoners_Presentation.pptx
history of medicine and evolution through the periods
STATUTE-130-Pg2000.pdf Lei Magnitisk - Estados Unidos da América
Moral-Theology-PRELIMS.pptxhshsjjwjwjjjk
RESULTING TRUST AND THE PRESUMPTION OF ADVANCEMENT.pptx
Unit-1: Historical Perspective: Constitutional Developments since 1858 to 1947
Over view on IPR and its components :ppt
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
The 5 Deadly Trademark Sins - AKA the Absolute Bars to Registration
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
Notes on Plausibility - A Review of the English and EPO Cases
Digital Security in Cyber Law and Mitigating Cyberxrimes
Children_Rights_Full_Presentation_With_Images.pptx
ADMINSITRATIVE LAW QUESTION PAPER QUESTION BANK.docx
BIOETHICS powerpoint presentation to use
medical ethics and professional misconduct ppt
Lecture Notes on Family Law - Knowledge Area 5
AHRP LB - Quick Look of the Newly-initiated Koperasi Merah Putih (KMP).pdf
Biotechnology and Bioethics for referenc

Cyber Crime

  • 1. CRIMINOLOGY TOPIC- CYBER CRIME PREPARED BY - AFNAN HUSAIN CLASS - SY LLB (SEM 4) SEAT NO. - 40015
  • 2. WHAT IS CYBER CRIME? • A cyber crime may be defined as any illegal criminal activity that uses a computer either as an instrumentality, target or means of perpetrating further crime. • In other words cyber crime is an unlawful act wherein the computer is either a tool or a target or both. • Cyber crime is any crime that takes place online or primarily online. Cyber criminals often commit crimes by targeting computer network and devices.
  • 3. • Cyber crime can range from security breaches to identity theft, and includes cyber stalking, harassment, bullying and child sexual exploitation. • Terrorists collaborate on the internet to carry out their illegal activities in cyberspace. Cyber crime continues to evolve with new threats surfacing all over the world. • The distinction between cyber crime and conventional crime lies in the involvement of the medium in cases of cyber crime. That is, there should be involvement, at any stage, of the virtual cyber medium in case of a cyber crime.
  • 4. NATURE OF CYBER CRIME • Cyber space and internet having developed as favourite medium of carrying on wide range of activities, has at the same time became an easy and convenient mode of committing cyber crime the world over, which can be detected only with the international co-operation of law enforcement agencies of different countries. • In April 2010, at the Twelfth UN Congress on Crime Prevention and Criminal Justice held extensive discussion expressing serious concern over the massive use of computer science and technology by the perpetrators of cyber crime and measure to be adopted by authorities in fighting against these crimes.
  • 5. REASONS FOR CYBER CRIME • The computer has the unique characteristic of storing data in a relatively very small space. • Computer are easy to access and therefore, unauthorised access by the use of complex cyber space technology is easily possible by passing security system. • The computers work on operating system which are complex and are composed of millions of codes. The cyber offenders take advantage of this. • One of the significant features of the computer system is that evidence is destroyed in no time. The criminals find it very easy to destroy the evidence soon after the crime is committed.
  • 6. TYPES OF CYBER CRIME • Hacking: Hacking in simple terms means an illegal intrusion into a computer system and/or network. • E- mail Spoofing: A spoofed e-mail may be said to be one which misrepresents its origin. That is, it shows its origin to be different from which it actually originates. • Computer Vandalism: Any kind of physical damage done to the computer of any person. It may be in the form of theft of a computer or some part thereof.
  • 7. • Cyber Terrorism: Cyber terrorism may be said to be a convergence of terrorism and cyber space involving unlawful attacks or threats of attacks against computers, networks, and the information stored therein, in order to coerce or intimidate a government or its people in furtherance of political, social, or ideological objectives. • Cyber Pornography: Computers and internet have opened new flood gates for pornographic material being available on websites which has adverse effect on moral health of youngsters, particularly adolescents.
  • 8. OTHER TYPES OF CYBER CRIMES • Cyber Stalking • Cyber Defamation • E-mail Frauds • Identity Theft • Data Diddling • Phishing
  • 9. HOW TO AVOID BECOMING A VICTIM OF CERTAIN TYPES OF CYBER CRIME • Don’t enter private and confidential information on your personal computer. • Always use a firewall. Also, always use one or two anti-spyware programs in addition to your anti-virus software, and keep them up to date • Don't reply to an email or pop-up message that asks for personal or financial information, and don't click on links in the message • Store your information elsewhere apart from your PC like on a flash disk or an external hard drive • Download a safe search tool like SiteAdvisor which will advise
  • 10. IMPACT OF CYBER CRIME • The expansion of internet and computer all over the world has generated a new species of crime commonly known as cyber crimes. The areas most hit by the impact of these crimes is, economy and security regimes because the alarmingly expanding dimensions of cyber frauds and terrorists activities of hardcore terrorists are ruining the nation’s economy and posing a threat to the national security destroying its internal and external peace. • Looking to the international dimensions of these crimes and jurisdictional problems between the countries and variations in the cyber law, the electronic transaction and liability issues for the acts executed in cyberspace still remain hazy and uncertain