SlideShare a Scribd company logo
Cyber Terriosim…..
Cybercrime is a term for any illegal activity that uses a computer as
its primary means of commission. The U.S. Department of Justice
expands the definition of cybercrime to include any illegal activity
that uses a computer for the storage of evidence.
What Is Cyber Crime ?
 1. Phishing
 2. Hacking
 3. Stalking and/or
Harassment
 4. Spam
 5.Fraud
 6. Obscene or
offensive content
Phishing is the practice of sending
fraudulent emails in an attempt to
trick the recipient, usually for the
purpose of obtaining money. The
elderly are particularly vulnerable to
these types of cyber crime.
Hacking is similar to digital trespassing.
Hackers infiltrate online networks to
illegally download confidential information,
manipulate functions and in some cases
steal identities that can be used to
fraudulently purchase goods online.
Not all types of cyber crime involve
money. Some cyber criminals use the
Internet as a cover for other illegal
behaviors like stalking, harassment
and in lesser cases, bullying.
Spam, or the unsolicited sending of bulk
email for commercial purposes, is unlawful
in some jurisdictions. While anti-spam laws
are relatively new, limits on unsolicited
electronic communications have existed for
some time.
Computer fraud is any dishonest
misrepresentation of fact
intended to let another to do or
refrain from doing something
which causes loss.
The content of websites and
other electronic communications
may be distasteful, obscene or
offensive for a variety of reasons.
In some instances these
communications may be illegal.
 1. Loss Of Revenue
 2. Wasted Time
 3. Damaged Reputations
 4. Reduced Productivity
One of the main effects of cyber crime on a
company is a loss of revenue. This loss can
be caused by an outside party who obtains
sensitive financial information, using it to
withdraw funds from an organization. It can
also occur when a business's e-commerce
site becomes compromised-while
inoperable, valuable income is lost when
consumers are unable to use the site.
Another major effect or consequence of
cyber crime is the time that is wasted when
IT personnel must devote great portions of
their day handling such incidences. Rather
than working on productive measures for an
organization, many IT staff members spend
a large percentage of their time handling
security breaches and other problems
associated with cyber crime.
In cases where customer records are
compromised by a security breach
associated with cyber crime, a company's
reputation can take a major hit. Customers
whose credit cards or other financial data
become intercepted by hackers or other
infiltrators lose confidence in an
organization and often begin taking their
business elsewhere.
Due to the measures that many companies
must implement to counteract cyber
crime, there is often a negative effect on
employees' productivity. This is
because, due to security
measures, employees must enter more
passwords and perform other time-
consuming acts in order to do their jobs.
Every second wasted performing these tasks
is a second not spent working in a
productive manner.
 1. Ease of Anonymity
 2. Holding a Grudge
 3. Thrill of the Game
Computer crime has risen at an astronomical
rate, in large part due to the ease with which a
perpetrator can remain undetected or
anonymous. It is much easier to get away with
criminal activity in a cyber world than in the
real world. However, the ability to track IP
network addresses is becoming greater all the
time, making it harder to remain invisible
when online. Still, there is a strong sense of
anonymity that can draw otherwise respectable
citizens to abandon their ethics in pursuit of
personal gain.
Malicious computer codes like worms
and viruses are often spread by someone
who is seeking to cause harm to an
individual or company--possibly over
losing a job, perceived unethical business
conduct or maybe even jealousy or envy.
Such parties intend to destroy or cripple
their targets for the personal satisfaction
of seeing them suffer the effects.
For many computer criminals, the excitement
and challenge of exploiting a computer system
can be too great to resist. Computer gurus are
notorious for gleaning information about
specific networks and software designs that
they have an irresistible urge to put to a test.
Unfortunately, much of this information
translates into illegally compromising
computer systems in one way or another. Still,
the lure of "cracking the code" will continue to
be a major factor in enticing some to commit
computer crimes.
1.Be Smart
2.Be Safe
3.Be Cautious
4.Stay Updated
5.Pay Securely
Do not provide personal details online to
people you have never met. This
concept is simple; you do not usually
give your personal information to a
stranger you met on the street. The
same rules apply on the Internet. When
you are required to provide some basic
information ensure that you are doing
so at trusted websites. However, never
reply to emails from unknown senders
asking you for personal information.
Never provide your online banking
information online to anyone.
Protect your computer from hackers
and malware by installing a
firewall, anti-virus software, and anti-
spyware software. Beware of free anti-
spyware software as some of these will
automatically install malware on your
computer. Download these programs
from trusted websites. Keep your anti-
virus software up-to-date by updating
the latest virus definitions regularly.
Check the terms of use when
installing new software on your
computer. Be extra cautious when
installing free software downloaded
from the Internet. Many of these
apparently "free" programs come
with hidden programs that install
malware on your computer without
your knowledge.
Keep your Internet browser up-to-
date. Security threats are discovered
on a daily basis. Always install the
latest version on your computer.
Update your operating system and
other software installed on your
computer with the latest security
patches and updates.
Make online payments only on
website that have an encrypted
connection. Websites that have a
security certificate start with
"https://" and not "http://". You
can verify whether the website is
secure by looking for the small
padlock icon in your browser
window.
Computer crime isn’t victimless. Millions of people lose money to ruthless cyber
criminals every year, and some are actually physically harmed by people they
meet online. When you’re using the Web, remember to stay alert, stay aware and
protect your information.
The threat of cyber crime is real, so act accordingly
Say No To Cyber Crime !!
The End
Thank You
Bushra

More Related Content

PPTX
Cyber crime ✔
hubbysoni
 
PPTX
Cyber crime
Harendra Singh
 
PPTX
Cyber Crime
Muhammad Irfan
 
PDF
Cyber security
Bhavin Shah
 
PPT
Cyber crimes and their prevention
Ansar Gill
 
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
PPTX
Cyber crime and security
Eng. Shuaib ibrahim
 
Cyber crime ✔
hubbysoni
 
Cyber crime
Harendra Singh
 
Cyber Crime
Muhammad Irfan
 
Cyber security
Bhavin Shah
 
Cyber crimes and their prevention
Ansar Gill
 
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Cyber crime and security
Eng. Shuaib ibrahim
 

What's hot (20)

PPT
Cybercrime the emerging threat
ANKUR BAROT
 
PDF
Cyber Security Awareness
Ramiro Cid
 
PPTX
cyber crime
Saba MuShtaq
 
PPT
History and future cybercrime
Online
 
PPTX
Ppt
Geetu Khanna
 
PPTX
CyberCrime
Sourav Kumar Mund
 
PDF
Cyber security awareness for students
Kandarp Shah
 
PPT
presentation on cyber crime and security
Alisha Korpal
 
PPTX
Cyber security presentation
Parab Mishra
 
ODP
Cyber crime
Nishi Agrawal
 
PPTX
Cyber crime
Grant Thornton Bangladesh
 
PPTX
Cyber Security in Society
Rubal Sagwal
 
PPTX
Cyber Crime
mukeshkaran
 
PPTX
Cyber security
Dr. Kishor Nikam
 
PPTX
Cyber Space
Kashif Latif
 
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
PPT
Introduction to Cyber Security
Stephen Lahanas
 
PPTX
Cyber Security Awareness Program.pptx
Dinesh582831
 
PPTX
Network Security
Abdul Qadir Pattal
 
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Cybercrime the emerging threat
ANKUR BAROT
 
Cyber Security Awareness
Ramiro Cid
 
cyber crime
Saba MuShtaq
 
History and future cybercrime
Online
 
CyberCrime
Sourav Kumar Mund
 
Cyber security awareness for students
Kandarp Shah
 
presentation on cyber crime and security
Alisha Korpal
 
Cyber security presentation
Parab Mishra
 
Cyber crime
Nishi Agrawal
 
Cyber Security in Society
Rubal Sagwal
 
Cyber Crime
mukeshkaran
 
Cyber security
Dr. Kishor Nikam
 
Cyber Space
Kashif Latif
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Introduction to Cyber Security
Stephen Lahanas
 
Cyber Security Awareness Program.pptx
Dinesh582831
 
Network Security
Abdul Qadir Pattal
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Ad

Viewers also liked (20)

PPTX
Cybercrime.ppt
Aeman Khan
 
PPTX
Cyber crime ppt
MOE515253
 
PPTX
Cyber-crime PPT
Anshuman Tripathi
 
PPT
Cybercrime
promit
 
PPT
Cybercrime presentation
Rajat Jain
 
PPT
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
PPTX
Cyber crime and security ppt
Lipsita Behera
 
PPTX
Cyber crime
Soreingam Ragui
 
PPTX
Cyber security presentation
Bijay Bhandari
 
PPTX
Cyber security
Siblu28
 
PPT
Cyber crime
Raja Farhan Saeed
 
PPT
Cyber crime among students
june21harsh
 
PPT
Cyber Crime and Security
Dipesh Waghela
 
PPT
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI
AWeber
 
KEY
Get More Email Subscribers
AWeber
 
PDF
Microsoft word java
Ravi Purohit
 
PPT
Email List-Building 101: How to Reel In New Readers with a Few Simple Steps
AWeber
 
DOCX
Cyber Crime
fiza209
 
PPT
Symantec AntiSpam Complete Overview (PowerPoint)
webhostingguy
 
PPT
Como funcionam as ameaças da internet e o cybercrime
Clavis Segurança da Informação
 
Cybercrime.ppt
Aeman Khan
 
Cyber crime ppt
MOE515253
 
Cyber-crime PPT
Anshuman Tripathi
 
Cybercrime
promit
 
Cybercrime presentation
Rajat Jain
 
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
Cyber crime and security ppt
Lipsita Behera
 
Cyber crime
Soreingam Ragui
 
Cyber security presentation
Bijay Bhandari
 
Cyber security
Siblu28
 
Cyber crime
Raja Farhan Saeed
 
Cyber crime among students
june21harsh
 
Cyber Crime and Security
Dipesh Waghela
 
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI
AWeber
 
Get More Email Subscribers
AWeber
 
Microsoft word java
Ravi Purohit
 
Email List-Building 101: How to Reel In New Readers with a Few Simple Steps
AWeber
 
Cyber Crime
fiza209
 
Symantec AntiSpam Complete Overview (PowerPoint)
webhostingguy
 
Como funcionam as ameaças da internet e o cybercrime
Clavis Segurança da Informação
 
Ad

Similar to Cyber crime ppt (20)

PPTX
Cyber Crime
Mohan Robert
 
PDF
Cyber security olive green mint ppt .pdf
kirtigoyal328
 
PPSX
Multimedia12 by aparajeeta
Aparajeeta Salu
 
PPTX
cyber-crimghgirrif8eieifififejwjdjes.pptx
aparnakanampalle1
 
PDF
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
PPTX
Cyber_security_EI _48,49,50.pptx
BhulanDeb
 
PPSX
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
PPTX
Cyber crime and Security
Hussain777
 
PPT
Cyber crime and cyber security
Kaushal Solanki
 
PPTX
What is Cybercrime and How to Prevent Cybercrime?
Entrance Exam Info
 
DOCX
Information Technology, cybersecurity and protection.docx
mkumar133
 
PPTX
Cyber Crime & Precautions
Talwant Singh
 
PPTX
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
PPTX
Cyber crime
Ruhil Arora
 
PPTX
Cyber Security, cyber crime and cyber safety all .pptx
sri223n
 
PPT
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
PDF
Cyber Crime Types & Tips
Deepak Kumar (D3)
 
PPTX
Cybercrime
Vansh Verma
 
PDF
Cyber Crime
Alisha Jain
 
PPTX
ppt Cybercrime
Avinash Katariya
 
Cyber Crime
Mohan Robert
 
Cyber security olive green mint ppt .pdf
kirtigoyal328
 
Multimedia12 by aparajeeta
Aparajeeta Salu
 
cyber-crimghgirrif8eieifififejwjdjes.pptx
aparnakanampalle1
 
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber_security_EI _48,49,50.pptx
BhulanDeb
 
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Cyber crime and Security
Hussain777
 
Cyber crime and cyber security
Kaushal Solanki
 
What is Cybercrime and How to Prevent Cybercrime?
Entrance Exam Info
 
Information Technology, cybersecurity and protection.docx
mkumar133
 
Cyber Crime & Precautions
Talwant Singh
 
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Cyber crime
Ruhil Arora
 
Cyber Security, cyber crime and cyber safety all .pptx
sri223n
 
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
Cyber Crime Types & Tips
Deepak Kumar (D3)
 
Cybercrime
Vansh Verma
 
Cyber Crime
Alisha Jain
 
ppt Cybercrime
Avinash Katariya
 

Recently uploaded (20)

PDF
madgavkar20181017ppt McKinsey Presentation.pdf
georgschmitzdoerner
 
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
PDF
NewMind AI Monthly Chronicles - July 2025
NewMind AI
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PDF
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Test Bank, Solutions for Java How to Program, An Objects-Natural Approach, 12...
famaw19526
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
AVTRON Technologies LLC
 
PDF
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
PDF
DevOps & Developer Experience Summer BBQ
AUGNYC
 
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
PDF
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
madgavkar20181017ppt McKinsey Presentation.pdf
georgschmitzdoerner
 
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
NewMind AI Monthly Chronicles - July 2025
NewMind AI
 
This slide provides an overview Technology
mineshkharadi333
 
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Test Bank, Solutions for Java How to Program, An Objects-Natural Approach, 12...
famaw19526
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
Software Development Company | KodekX
KodekX
 
Software Development Methodologies in 2025
KodekX
 
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
AVTRON Technologies LLC
 
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
DevOps & Developer Experience Summer BBQ
AUGNYC
 
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 

Cyber crime ppt

  • 2. Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence. What Is Cyber Crime ?
  • 3.  1. Phishing  2. Hacking  3. Stalking and/or Harassment  4. Spam  5.Fraud  6. Obscene or offensive content
  • 4. Phishing is the practice of sending fraudulent emails in an attempt to trick the recipient, usually for the purpose of obtaining money. The elderly are particularly vulnerable to these types of cyber crime.
  • 5. Hacking is similar to digital trespassing. Hackers infiltrate online networks to illegally download confidential information, manipulate functions and in some cases steal identities that can be used to fraudulently purchase goods online.
  • 6. Not all types of cyber crime involve money. Some cyber criminals use the Internet as a cover for other illegal behaviors like stalking, harassment and in lesser cases, bullying.
  • 7. Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronic communications have existed for some time.
  • 8. Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss.
  • 9. The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be illegal.
  • 10.  1. Loss Of Revenue  2. Wasted Time  3. Damaged Reputations  4. Reduced Productivity
  • 11. One of the main effects of cyber crime on a company is a loss of revenue. This loss can be caused by an outside party who obtains sensitive financial information, using it to withdraw funds from an organization. It can also occur when a business's e-commerce site becomes compromised-while inoperable, valuable income is lost when consumers are unable to use the site.
  • 12. Another major effect or consequence of cyber crime is the time that is wasted when IT personnel must devote great portions of their day handling such incidences. Rather than working on productive measures for an organization, many IT staff members spend a large percentage of their time handling security breaches and other problems associated with cyber crime.
  • 13. In cases where customer records are compromised by a security breach associated with cyber crime, a company's reputation can take a major hit. Customers whose credit cards or other financial data become intercepted by hackers or other infiltrators lose confidence in an organization and often begin taking their business elsewhere.
  • 14. Due to the measures that many companies must implement to counteract cyber crime, there is often a negative effect on employees' productivity. This is because, due to security measures, employees must enter more passwords and perform other time- consuming acts in order to do their jobs. Every second wasted performing these tasks is a second not spent working in a productive manner.
  • 15.  1. Ease of Anonymity  2. Holding a Grudge  3. Thrill of the Game
  • 16. Computer crime has risen at an astronomical rate, in large part due to the ease with which a perpetrator can remain undetected or anonymous. It is much easier to get away with criminal activity in a cyber world than in the real world. However, the ability to track IP network addresses is becoming greater all the time, making it harder to remain invisible when online. Still, there is a strong sense of anonymity that can draw otherwise respectable citizens to abandon their ethics in pursuit of personal gain.
  • 17. Malicious computer codes like worms and viruses are often spread by someone who is seeking to cause harm to an individual or company--possibly over losing a job, perceived unethical business conduct or maybe even jealousy or envy. Such parties intend to destroy or cripple their targets for the personal satisfaction of seeing them suffer the effects.
  • 18. For many computer criminals, the excitement and challenge of exploiting a computer system can be too great to resist. Computer gurus are notorious for gleaning information about specific networks and software designs that they have an irresistible urge to put to a test. Unfortunately, much of this information translates into illegally compromising computer systems in one way or another. Still, the lure of "cracking the code" will continue to be a major factor in enticing some to commit computer crimes.
  • 19. 1.Be Smart 2.Be Safe 3.Be Cautious 4.Stay Updated 5.Pay Securely
  • 20. Do not provide personal details online to people you have never met. This concept is simple; you do not usually give your personal information to a stranger you met on the street. The same rules apply on the Internet. When you are required to provide some basic information ensure that you are doing so at trusted websites. However, never reply to emails from unknown senders asking you for personal information. Never provide your online banking information online to anyone.
  • 21. Protect your computer from hackers and malware by installing a firewall, anti-virus software, and anti- spyware software. Beware of free anti- spyware software as some of these will automatically install malware on your computer. Download these programs from trusted websites. Keep your anti- virus software up-to-date by updating the latest virus definitions regularly.
  • 22. Check the terms of use when installing new software on your computer. Be extra cautious when installing free software downloaded from the Internet. Many of these apparently "free" programs come with hidden programs that install malware on your computer without your knowledge.
  • 23. Keep your Internet browser up-to- date. Security threats are discovered on a daily basis. Always install the latest version on your computer. Update your operating system and other software installed on your computer with the latest security patches and updates.
  • 24. Make online payments only on website that have an encrypted connection. Websites that have a security certificate start with "https://" and not "http://". You can verify whether the website is secure by looking for the small padlock icon in your browser window.
  • 25. Computer crime isn’t victimless. Millions of people lose money to ruthless cyber criminals every year, and some are actually physically harmed by people they meet online. When you’re using the Web, remember to stay alert, stay aware and protect your information. The threat of cyber crime is real, so act accordingly
  • 26. Say No To Cyber Crime !! The End Thank You Bushra