SlideShare a Scribd company logo
2
Most read
3
Most read
13
Most read
Speakers :
Fettah KURTULUŞ
 Computer crime, or cybercrime, refers to any crime
 that involves a computer and a network(Internet).
 The Computer as a Target : using a computer to
 attack other computers.

 The computer as a weapon : using a computer to
 commit real world crimes.
 HACKING
 VIRUS DISSEMINITION
 COMPUTER VANDALISM
 CYBER TERRORISM
 SOFTWARE PIRACY
CyberCrimes
Hacking in simple terms
means an illegal attack
into a computer system
and/or network. It is also
known as CRACKING.
Government websites are
the hot targets of the
hackers due to the press
coverage, it receives.
Hackers enjoy the media
coverage.
Malicious software that attaches itself to other software.
(virus, worms, Trojan Horse, web jacking, e-mail bombing
etc)
Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism. Transmitting
virus: These are programs that attach themselves to a file
and then circulate .
Terrorist attacks on the Internet is by distributed denial of
service attacks, hate websites and hate emails, attacks
on sensitive computer networks, etc. Technology savvy
terrorists are using 512-bit encryption, which is
impossible to decrypt.
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of
products intended to pass for the original.
Internet security is a branch
of computer security specifically
related to the Internet.
 It's objective is to establish rules
and measure to use against
attacks over the Internet.
CyberCrimes
   Use antivirus software’s
   insert firewalls
   uninstall unnecessary software
   maintain backup
   check security settings
   Stay anonymous - choose a genderless screen name
   Never give your full name or address to strangers
 Learn ‘inetiquette' - follow it and
    expect it from others
   Don't respond to harassing or
    negative messages (flames)
   Get out of uncomfortable or
    hostile situations quickly
   Save offending messages
   Learn more about Internet
    privacy
CyberCrimes
 The cyber security will defend us from critical attacks.
 It helps us to browse the safe website.
 Internet security process all the incoming and outgoing
  data on our computer.
 security will defend from hacks and virus.
 The application of cyber security used in our PC needs
  update every week.
 The security developers will update their database every
  week once. Hence the new virus also deleted
Technology is destructive only in the hands of
people who do not realize that they are one and
the same process as the universe.
Alan Watts

“Technology   is like a fish. The longer it stays
on the shelf, the less desirable it becomes.”
CyberCrimes

More Related Content

PPTX
Cyber crime
Harendra Singh
 
PPTX
Cyber crime.pptx
Dawood Faheem Abbasi
 
PPTX
Cyber crime
Muhammad Zeeshan Muzaffar
 
PPTX
Cyber crime ppt
Gracy Joseph
 
PPTX
Cyber crime & security
pinkutinku26
 
PPTX
Cyber crime
Soreingam Ragui
 
PPTX
Cyber crime
Grant Thornton Bangladesh
 
PPT
Cybercrime the emerging threat
ANKUR BAROT
 
Cyber crime
Harendra Singh
 
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber crime ppt
Gracy Joseph
 
Cyber crime & security
pinkutinku26
 
Cyber crime
Soreingam Ragui
 
Cybercrime the emerging threat
ANKUR BAROT
 

What's hot (20)

PPT
Cyber Crime and Security
Dipesh Waghela
 
PPTX
Cyber crime and security
Akash Dhiman
 
PPTX
cyber security
BasineniUdaykumar
 
PPTX
Ppt
Geetu Khanna
 
PPTX
Cyber Crime and Security
Md Nishad
 
PPTX
Cyber security presentation
Parab Mishra
 
PPTX
Cyber Crime and Security
Chitra Mudunuru
 
PPTX
Cyber crime and security
Sharath Raj
 
PPTX
Cyber crime ✔
hubbysoni
 
PPTX
Final cyber crime and security
nikunjandy
 
PPTX
Cyber Crime
mukeshkaran
 
PPTX
Cyber Crime
Ramesh Upadhaya
 
PPTX
CYBER SECURITY
Mohammad Shakirul islam
 
PPTX
Cyber crime and security ppt
Lipsita Behera
 
PPTX
Introduction to ethical hacking
Vikram Khanna
 
PPTX
Cyber crime
yazad dumasia
 
PPTX
It act and cyber crime
Dheeraj Dani
 
PPT
Cyber security & Importance of Cyber Security
Mohammed Adam
 
PPTX
Cyber terrorism
shaympariyar
 
PPTX
Cyber Crime
Muhammad Irfan
 
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime and security
Akash Dhiman
 
cyber security
BasineniUdaykumar
 
Cyber Crime and Security
Md Nishad
 
Cyber security presentation
Parab Mishra
 
Cyber Crime and Security
Chitra Mudunuru
 
Cyber crime and security
Sharath Raj
 
Cyber crime ✔
hubbysoni
 
Final cyber crime and security
nikunjandy
 
Cyber Crime
mukeshkaran
 
Cyber Crime
Ramesh Upadhaya
 
CYBER SECURITY
Mohammad Shakirul islam
 
Cyber crime and security ppt
Lipsita Behera
 
Introduction to ethical hacking
Vikram Khanna
 
Cyber crime
yazad dumasia
 
It act and cyber crime
Dheeraj Dani
 
Cyber security & Importance of Cyber Security
Mohammed Adam
 
Cyber terrorism
shaympariyar
 
Cyber Crime
Muhammad Irfan
 
Ad

Viewers also liked (20)

PPTX
Cybercrime.ppt
Aeman Khan
 
PPTX
Cyber-crime PPT
Anshuman Tripathi
 
PDF
Computer Networks
guestf10d8f
 
PPTX
Cybercrime & Security
Shreeraj Nair
 
PPTX
Cooperative Learning with the Computer (Educational Technology 2)
Cherry Ann Malabanan
 
PPTX
EdTech 2 Cooperative Learning with the Computer
Jan Bumanlag
 
PPTX
Cooperative Learning with the Computer
Jomar Urbano
 
PPT
Lesson 15 THE UNDERSTANDING HYPERMEDIA
Analyn Villagracia
 
PPTX
Virus and worms
Vikas Sharma
 
PPT
Viruses, Worms And Trojan Horses
Mario Reascos
 
PPTX
Virus worm trojan
100701982
 
PPTX
Understanding hypermedia
Leslie Nicdao
 
PPTX
Cooperative Learning with the Computer
Abraham Malacao
 
PPTX
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
PPTX
Ethical hacking presentation
Suryansh Srivastava
 
PPTX
Hacking ppt
giridhar_sadasivuni
 
PPTX
Cyber security presentation
Bijay Bhandari
 
PPT
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
PPTX
Computer networking devices
Rajesh Sadhukha
 
PPT
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 
Cybercrime.ppt
Aeman Khan
 
Cyber-crime PPT
Anshuman Tripathi
 
Computer Networks
guestf10d8f
 
Cybercrime & Security
Shreeraj Nair
 
Cooperative Learning with the Computer (Educational Technology 2)
Cherry Ann Malabanan
 
EdTech 2 Cooperative Learning with the Computer
Jan Bumanlag
 
Cooperative Learning with the Computer
Jomar Urbano
 
Lesson 15 THE UNDERSTANDING HYPERMEDIA
Analyn Villagracia
 
Virus and worms
Vikas Sharma
 
Viruses, Worms And Trojan Horses
Mario Reascos
 
Virus worm trojan
100701982
 
Understanding hypermedia
Leslie Nicdao
 
Cooperative Learning with the Computer
Abraham Malacao
 
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
Ethical hacking presentation
Suryansh Srivastava
 
Hacking ppt
giridhar_sadasivuni
 
Cyber security presentation
Bijay Bhandari
 
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
Computer networking devices
Rajesh Sadhukha
 
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 
Ad

Similar to CyberCrimes (20)

PPT
cyber crime
Midhun Suresh
 
PPT
presentation on cyber crime and security
Alisha Korpal
 
PPT
Sahilmod 120315100301-phpapp01
Nelito Systems Ltd
 
PPT
Cyber Crime
zahid_ned
 
PPTX
Cyber Crime and Social Media Security
Hem Pokhrel
 
PPTX
Computer crime
Vishesh Dalal
 
PPTX
Infocrimeppt
Taniya Fansupkar
 
PPTX
Cyber crime and Security
Hussain777
 
PPTX
Computer Crime
Prothom Alo
 
PPTX
Cyber crime and security
BasitShah18
 
PPTX
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
PPTX
Chapter-10-Information Security and Cyber Crime.pptx
reaz4524
 
PPTX
cyber crime and security
Ajay Singh
 
PPTX
iIIBF Cyber Security Presentation 2.pptx
NarinderKumarBhasin
 
PPSX
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
PPTX
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
PDF
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
PPTX
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
RahulDhanware2
 
PPT
Cyber crime and cyber security
Kaushal Solanki
 
PDF
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
cyber crime
Midhun Suresh
 
presentation on cyber crime and security
Alisha Korpal
 
Sahilmod 120315100301-phpapp01
Nelito Systems Ltd
 
Cyber Crime
zahid_ned
 
Cyber Crime and Social Media Security
Hem Pokhrel
 
Computer crime
Vishesh Dalal
 
Infocrimeppt
Taniya Fansupkar
 
Cyber crime and Security
Hussain777
 
Computer Crime
Prothom Alo
 
Cyber crime and security
BasitShah18
 
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Chapter-10-Information Security and Cyber Crime.pptx
reaz4524
 
cyber crime and security
Ajay Singh
 
iIIBF Cyber Security Presentation 2.pptx
NarinderKumarBhasin
 
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
RahulDhanware2
 
Cyber crime and cyber security
Kaushal Solanki
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 

Recently uploaded (20)

PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
Shreyas_Phanse_Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
SHREYAS PHANSE
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
PDF
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
AbdullahSani29
 
PPTX
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
PDF
Software Development Company | KodekX
KodekX
 
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
AVTRON Technologies LLC
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
Shreyas_Phanse_Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
SHREYAS PHANSE
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
AbdullahSani29
 
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
Software Development Company | KodekX
KodekX
 
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
AVTRON Technologies LLC
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 

CyberCrimes

  • 2.  Computer crime, or cybercrime, refers to any crime that involves a computer and a network(Internet).
  • 3.  The Computer as a Target : using a computer to attack other computers.  The computer as a weapon : using a computer to commit real world crimes.
  • 4.  HACKING  VIRUS DISSEMINITION  COMPUTER VANDALISM  CYBER TERRORISM  SOFTWARE PIRACY
  • 6. Hacking in simple terms means an illegal attack into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
  • 7. Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc)
  • 8. Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate .
  • 9. Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 10. Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 11. Internet security is a branch of computer security specifically related to the Internet. It's objective is to establish rules and measure to use against attacks over the Internet.
  • 13. Use antivirus software’s  insert firewalls  uninstall unnecessary software  maintain backup  check security settings  Stay anonymous - choose a genderless screen name  Never give your full name or address to strangers
  • 14.  Learn ‘inetiquette' - follow it and expect it from others  Don't respond to harassing or negative messages (flames)  Get out of uncomfortable or hostile situations quickly  Save offending messages  Learn more about Internet privacy
  • 16.  The cyber security will defend us from critical attacks.  It helps us to browse the safe website.  Internet security process all the incoming and outgoing data on our computer.
  • 17.  security will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted
  • 18. Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe. Alan Watts “Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.”