SlideShare a Scribd company logo
3
Most read
5
Most read
11
Most read
 What is Cyber Crime ?
 History of Cyber Crime
 Types of Cyber Crime
 Causes of Cyber Crime
 How to tackle Cyber Crime?
 Crime committed over internet
 Involves internet
 Computers used to commit crimes
 Computers used as the target of the
crime
“Offenses that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm , or
loss to the victim directly or indirectly using modern
telecommunications such as internet and mobile phones.”
(Dr. Debarati Halder)
Later on , when computers and networks came into being in the 1990s, hacking
was done basically to get more information about the systems. Hackers even
competed against one another to win the tag of the best hacker. As a result, many
networks were affected, hacking started making networks and systems slow. As
hackers became more skilful, they started using their knowledge and expertise to
gain benefit by exploiting and victimizing others.
 Cyber Hacking
 Cyber Terrorism
 Cyber Theft
 Cyber Stalking
This is a type of crime where in a person’s
computer is broken into so that his personal or
sensitive information can be accessed. In some
cases person may not be aware that his computer is
being accessed from a remote location.
In hacking, the criminal uses a variety of
internet-based software or programs
• to enter a person’s computer ,
• to disrupt a network ,
• to gain access to a system ,
• to steal sensitive information or data,
• causing damage to software present in the
system.
Cyber terrorism is a phrase used to
describe the use of internet based
attacks in terrorist activities, including
acts of deliberate, large-scale
disruption of computer networks,
especially of personal computers
attached to the internet, by the means
of tools such as computer viruses.
It varies from ..
• Stealing data and hacking
• Planning terrorist attacks
• Causing violence
• Attacking information systems
In this cyber crime, a criminal accesses
data about a person’s bank account,
credit cards, Social Security, debit card
and other sensitive information to
siphon money or to buy things online in
the victim’s name. It can result in major
financial losses for the victim and even
spoil the victim’s credit history.
The personal information stolen can include the
person's name, social security number, birth date or
credit card numbers. This stolen information is then
used to obtain new credit cards, access bank
accounts or obtain other benefits, such as a driver's
license.
Cyber stalking is the use of the Internet or electronics to
stalk or harass an individual, an organization or a specific
group. Cyber stalking can include harassment of the
victim, the obtaining of financial information of the victim
or threatening the victim in order to frighten them. A cyber
stalker relies upon the anonymity afforded by the Internet
to allow them to stalk their victim without being detected.
Possible reasons:
 Passion of youngsters
 For the sake of recognition
 Desire of making quick money
 Misconception of fighting a just cause
 Dissatisfied/disappointed employees
 Drawbacks in judiciary systems
 Lack of evidence
 Inaccessibility to criminals
 Loopholes in system
 Negligence of security of data
 Confidential information is online
One of the best ways to avoid being a victim of cyber crimes and
protecting your sensitive information is by making use of impenetrable
security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet.
This helps to keep the network and the systems using the network safe.
The best way to go about is using the solutions provided by Cross-
Domain Solutions. Cross Domain Solution offers a way to keep all
information confidential by using safe and secure domains that cannot
be tracked or accessed.
cyber crime
cyber crime

More Related Content

PPT
presentation on cyber crime and security
Alisha Korpal
 
PPTX
Cyber crime.pptx
Dawood Faheem Abbasi
 
PPTX
Cyber crime
Muhammad Zeeshan Muzaffar
 
PPTX
Cyber crime and security
Eng. Shuaib ibrahim
 
PPTX
It act and cyber crime
Dheeraj Dani
 
PPTX
Cybercrime
Komal003
 
PPTX
Cyber crime ppt
Gracy Joseph
 
PDF
Case study on cyber crime
ishmecse13
 
presentation on cyber crime and security
Alisha Korpal
 
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber crime and security
Eng. Shuaib ibrahim
 
It act and cyber crime
Dheeraj Dani
 
Cybercrime
Komal003
 
Cyber crime ppt
Gracy Joseph
 
Case study on cyber crime
ishmecse13
 

What's hot (20)

PPTX
Cyber Crime
Avinash Rajput
 
PPTX
Cyber Crime
Muhammad Irfan
 
PPTX
Cyber Crime
Ramesh Upadhaya
 
PPTX
Cyber crime ppt
Ritesh Thakur
 
PPT
Cyber Crime and Security
Dipesh Waghela
 
PPTX
Cyber crime ✔
hubbysoni
 
PPTX
Cyber crime
Soreingam Ragui
 
PPTX
Cyber crime
yazad dumasia
 
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
PPTX
Cyber security presentation
Parab Mishra
 
PPTX
Cyber security
Samsil Arefin
 
PPTX
Cyber crime - What is and types.
Niloy Biswas
 
PPTX
Cyber crime
Jayant Raj
 
PPTX
Cyber Crime
mukeshkaran
 
PPTX
Cyber crime and security
Akash Dhiman
 
DOC
Cyber crime
Rajat Jain
 
PPTX
Cyber security
Sabir Raja
 
PPTX
Cyber crime
Grant Thornton Bangladesh
 
PPTX
CYBER SECURITY
Vaishak Chandran
 
PPTX
cyber security
BasineniUdaykumar
 
Cyber Crime
Avinash Rajput
 
Cyber Crime
Muhammad Irfan
 
Cyber Crime
Ramesh Upadhaya
 
Cyber crime ppt
Ritesh Thakur
 
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime ✔
hubbysoni
 
Cyber crime
Soreingam Ragui
 
Cyber crime
yazad dumasia
 
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Cyber security presentation
Parab Mishra
 
Cyber security
Samsil Arefin
 
Cyber crime - What is and types.
Niloy Biswas
 
Cyber crime
Jayant Raj
 
Cyber Crime
mukeshkaran
 
Cyber crime and security
Akash Dhiman
 
Cyber crime
Rajat Jain
 
Cyber security
Sabir Raja
 
CYBER SECURITY
Vaishak Chandran
 
cyber security
BasineniUdaykumar
 
Ad

Viewers also liked (20)

PPTX
Cybercrime
SERCOD
 
PPTX
Cyber Crime : Incident Highlights of 2011-2012
tejant
 
PPTX
Cybercrime Awareness
Johann Lo
 
PPTX
Cybercrime
Komal003
 
PPTX
Hacking a cause of cyber crime final
Harsha Matta
 
PPS
Cyber Crime
Pragnesh Ghoda
 
PPT
inflation rate
Tooba Khan
 
PPT
Inflation presented by Tooba
Tooba Khan
 
PPTX
66a it act APOORVA BILLORE ITMI DELHI
Apoorva Billore
 
PPTX
66a it act APOORVA BILLORE ITMI
Apoorva Billore
 
PPTX
Cyber Crime and Security Presentation
Preethi Kumaresh
 
PPT
Cyber Crime
Maruti Nandan
 
PPT
Information Technology
Kunal Agrawal
 
PPTX
Awareness Against Cyber Crime
Nithin Raj
 
PPT
Cyber crime
Jitesh Kumar Agarwal
 
PPTX
Cyber Crime
Darshan Vithani
 
PPTX
Legal (Types of Cyber Crime)
Jay Visavadiya
 
PDF
Keeping your child safe online
LuciusonSecurity
 
PPTX
Cyber Crime
Harshitha Rao
 
PPT
Cyber crime
Rohitha Sankar
 
Cybercrime
SERCOD
 
Cyber Crime : Incident Highlights of 2011-2012
tejant
 
Cybercrime Awareness
Johann Lo
 
Cybercrime
Komal003
 
Hacking a cause of cyber crime final
Harsha Matta
 
Cyber Crime
Pragnesh Ghoda
 
inflation rate
Tooba Khan
 
Inflation presented by Tooba
Tooba Khan
 
66a it act APOORVA BILLORE ITMI DELHI
Apoorva Billore
 
66a it act APOORVA BILLORE ITMI
Apoorva Billore
 
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Cyber Crime
Maruti Nandan
 
Information Technology
Kunal Agrawal
 
Awareness Against Cyber Crime
Nithin Raj
 
Cyber Crime
Darshan Vithani
 
Legal (Types of Cyber Crime)
Jay Visavadiya
 
Keeping your child safe online
LuciusonSecurity
 
Cyber Crime
Harshitha Rao
 
Cyber crime
Rohitha Sankar
 
Ad

Similar to cyber crime (20)

PDF
Cyber Law & Forensics
Harshita Ved
 
PDF
Cyber Crime
Alisha Jain
 
PPTX
Cyber crime
BadarHossain
 
PPTX
THE CYBER WORLD.pptx
KrishnaGupta769783
 
PPTX
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
PPSX
Cyber Crimes - An Introduction
Mukesh Tekwani
 
PPTX
Cyber Crime
Mehjabin Chowdhury
 
PPTX
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
PPTX
CLE-Cyber crimes.pptx
VipinRawat52
 
PDF
Cyber Security U-1 ONE SHOT (NEW) Notes_c7ff765d-5cc7-4213-b668-842b59eb9ee5.pdf
ujjawaltiwari606
 
PPTX
Cyber crimes and its security
Ashwini Awatare
 
PPTX
Cyber crimes and its security
Ashwini Awatare
 
PPTX
Cyber-crime and cyber security PPT.pptx
ALearner2
 
PDF
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
PPTX
Cyber crime presentation
Priya Saluja
 
PPT
Cyber Laws.ppt
silas Sargunam
 
PPTX
Cyber crime and security 1
indhuchezhian
 
PPTX
Cyber Crime
AfnanHusain
 
PPSX
Unit 1
Jigarthacker
 
PPTX
Cyber crime types & laws
sureshjogesh48
 
Cyber Law & Forensics
Harshita Ved
 
Cyber Crime
Alisha Jain
 
Cyber crime
BadarHossain
 
THE CYBER WORLD.pptx
KrishnaGupta769783
 
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber Crimes - An Introduction
Mukesh Tekwani
 
Cyber Crime
Mehjabin Chowdhury
 
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
CLE-Cyber crimes.pptx
VipinRawat52
 
Cyber Security U-1 ONE SHOT (NEW) Notes_c7ff765d-5cc7-4213-b668-842b59eb9ee5.pdf
ujjawaltiwari606
 
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Ashwini Awatare
 
Cyber-crime and cyber security PPT.pptx
ALearner2
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Cyber crime presentation
Priya Saluja
 
Cyber Laws.ppt
silas Sargunam
 
Cyber crime and security 1
indhuchezhian
 
Cyber Crime
AfnanHusain
 
Unit 1
Jigarthacker
 
Cyber crime types & laws
sureshjogesh48
 

Recently uploaded (20)

PDF
Best Seven Types of SEO You Should Know
Neuvo WebTech
 
PPTX
Social Media Report Template [To use the template, click the _File_ tab and s...
Ankit kurup
 
PDF
TikTok UGC Marketing_ Use Hashtags to Boost Sales.
Ufki
 
PDF
The impact of social media presence and advertising on the growth of Bet Vana...
shaankhanofficial11
 
PDF
Sociocosmos = Facebook Growth Partner Build With Us
SocioCosmos
 
PPTX
MIL Lesson 1 (Introduction to MIL).pptx
MarkAnthonyDeLeon12
 
PDF
Boost Your Business with Expert Digital Marketing Services
Amrit Web
 
PDF
Medium @mikehydes The Cryptomaster Story Stats
Mike Hydes
 
PDF
A copy of a Medium article wishing Merry Christmas To All My Followers
Mike Hydes
 
DOCX
Discord Accounts for Sale - Aged Discord accounts for sale
Discord Trade Hub
 
PDF
MIL LESSON 1 - MEDIA IN THE CONTEXT OF MIL.pdf
ellakimoxford
 
PDF
Real LinkedIn Growth That Works Upgrade Your Profile
SocioCosmos
 
PDF
Medium @mikehydes The Cryptomaster Home page
Mike Hydes
 
PDF
Be Seen Where It Scrolls Claim Your Spot
SocioCosmos
 
PDF
THE EFFECTIVENESS OF USING THE E-OFFICE AND THE SRIKANDI APPLICATIONS AT THE ...
AJHSSR Journal
 
PDF
Medium @mikehydes The Cryptomaster About page
Mike Hydes
 
PDF
Buy Facebook Growth That Works Get Started
SocioCosmos
 
PDF
Best Digital Marketing Services in India
Kunal Chouhan
 
PDF
STRESS AND COPING STRATEGIES DURING PANDEMIC AMONG ELEMENTARY SCHOOL TEACHERS
AJHSSR Journal
 
PDF
Your Brand’s Pinterest Blueprint Build Your Pinterest Plan
SocioCosmos
 
Best Seven Types of SEO You Should Know
Neuvo WebTech
 
Social Media Report Template [To use the template, click the _File_ tab and s...
Ankit kurup
 
TikTok UGC Marketing_ Use Hashtags to Boost Sales.
Ufki
 
The impact of social media presence and advertising on the growth of Bet Vana...
shaankhanofficial11
 
Sociocosmos = Facebook Growth Partner Build With Us
SocioCosmos
 
MIL Lesson 1 (Introduction to MIL).pptx
MarkAnthonyDeLeon12
 
Boost Your Business with Expert Digital Marketing Services
Amrit Web
 
Medium @mikehydes The Cryptomaster Story Stats
Mike Hydes
 
A copy of a Medium article wishing Merry Christmas To All My Followers
Mike Hydes
 
Discord Accounts for Sale - Aged Discord accounts for sale
Discord Trade Hub
 
MIL LESSON 1 - MEDIA IN THE CONTEXT OF MIL.pdf
ellakimoxford
 
Real LinkedIn Growth That Works Upgrade Your Profile
SocioCosmos
 
Medium @mikehydes The Cryptomaster Home page
Mike Hydes
 
Be Seen Where It Scrolls Claim Your Spot
SocioCosmos
 
THE EFFECTIVENESS OF USING THE E-OFFICE AND THE SRIKANDI APPLICATIONS AT THE ...
AJHSSR Journal
 
Medium @mikehydes The Cryptomaster About page
Mike Hydes
 
Buy Facebook Growth That Works Get Started
SocioCosmos
 
Best Digital Marketing Services in India
Kunal Chouhan
 
STRESS AND COPING STRATEGIES DURING PANDEMIC AMONG ELEMENTARY SCHOOL TEACHERS
AJHSSR Journal
 
Your Brand’s Pinterest Blueprint Build Your Pinterest Plan
SocioCosmos
 

cyber crime

  • 1.  What is Cyber Crime ?  History of Cyber Crime  Types of Cyber Crime  Causes of Cyber Crime  How to tackle Cyber Crime?
  • 2.  Crime committed over internet  Involves internet  Computers used to commit crimes  Computers used as the target of the crime “Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm , or loss to the victim directly or indirectly using modern telecommunications such as internet and mobile phones.” (Dr. Debarati Halder)
  • 3. Later on , when computers and networks came into being in the 1990s, hacking was done basically to get more information about the systems. Hackers even competed against one another to win the tag of the best hacker. As a result, many networks were affected, hacking started making networks and systems slow. As hackers became more skilful, they started using their knowledge and expertise to gain benefit by exploiting and victimizing others.
  • 4.  Cyber Hacking  Cyber Terrorism  Cyber Theft  Cyber Stalking
  • 5. This is a type of crime where in a person’s computer is broken into so that his personal or sensitive information can be accessed. In some cases person may not be aware that his computer is being accessed from a remote location. In hacking, the criminal uses a variety of internet-based software or programs • to enter a person’s computer , • to disrupt a network , • to gain access to a system , • to steal sensitive information or data, • causing damage to software present in the system.
  • 6. Cyber terrorism is a phrase used to describe the use of internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the internet, by the means of tools such as computer viruses. It varies from .. • Stealing data and hacking • Planning terrorist attacks • Causing violence • Attacking information systems
  • 7. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history. The personal information stolen can include the person's name, social security number, birth date or credit card numbers. This stolen information is then used to obtain new credit cards, access bank accounts or obtain other benefits, such as a driver's license.
  • 8. Cyber stalking is the use of the Internet or electronics to stalk or harass an individual, an organization or a specific group. Cyber stalking can include harassment of the victim, the obtaining of financial information of the victim or threatening the victim in order to frighten them. A cyber stalker relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected.
  • 9. Possible reasons:  Passion of youngsters  For the sake of recognition  Desire of making quick money  Misconception of fighting a just cause  Dissatisfied/disappointed employees  Drawbacks in judiciary systems  Lack of evidence  Inaccessibility to criminals  Loopholes in system  Negligence of security of data  Confidential information is online
  • 10. One of the best ways to avoid being a victim of cyber crimes and protecting your sensitive information is by making use of impenetrable security that uses a unified system of software and hardware to authenticate any information that is sent or accessed over the Internet. This helps to keep the network and the systems using the network safe. The best way to go about is using the solutions provided by Cross- Domain Solutions. Cross Domain Solution offers a way to keep all information confidential by using safe and secure domains that cannot be tracked or accessed.