SlideShare a Scribd company logo
UNDERSTANDING THE
CYBERCRIMES
Facilitator: Navjyotsinh Jadeja
Outline
• Who are Cyber Criminals
• Classification of Cybercrimes
• 3 Categories of Cybercrimes
WWW.EDTECHNOLOGY.IN
E-mail Spoofing
• Email spoofing is the creation of email messages with a forged
sender address.
WWW.EDTECHNOLOGY.IN
Ways to Combat Email Spoofing
WWW.EDTECHNOLOGY.IN
Ways to Combat Email Spoofing
WWW.EDTECHNOLOGY.IN
Spamming
WWW.EDTECHNOLOGY.IN
• Spamming is the use of
messaging systems to send
an unsolicited message to
large numbers of recipients
for the purpose of commercial
advertising, for the purpose of
non-commercial proselytizing,
or for any prohibited purpose.
Example of Spamming
WWW.EDTECHNOLOGY.IN
Cyber Defamation
WWW.EDTECHNOLOGY.IN
• Cyber Defamation means
using the internet as a tool
to defame and malign
another person. It involves
use of social media and
online campaigns to tarnish
the image of the victim.
SALAMI ATTACK
WWW.EDTECHNOLOGY.IN
• A salami attack is when
small attacks add up to one
major attack that can go
undetected due to the nature of
this type of cyber crime. It also
known as salami slicing.
SALAMI ATTACK DATA DIDDLING
WWW.EDTECHNOLOGY.IN
• Data diddling is the act of
extracting and changing value of a
data without the knowledge of
owner is a crime. A data diddling
(also called false data entry)
simply means altering of data
before entering it or during
entering to the computer system
FORGERY
WWW.EDTECHNOLOGY.IN
• Data diddling is the act of
extracting and changing value of a
data without the knowledge of
owner is a crime. A data diddling
(also called false data entry)
simply means altering of data
before entering it or during
entering to the computer system
THANK YOU
WWW.EDTECHNOLOGY.IN

More Related Content

PPTX
1.2 Who are Cyber Criminals
PPTX
cyber crime
PDF
Cybercrime by Suphiyaan
PPTX
Cyber crime presentation school level
PPTX
CYBERSPACE & CRIMINAL BEHAVIOR
PPSX
Towards an understanding of cyber crime final
PPT
Seminar on Cyber Crime
DOC
Computer crimes
1.2 Who are Cyber Criminals
cyber crime
Cybercrime by Suphiyaan
Cyber crime presentation school level
CYBERSPACE & CRIMINAL BEHAVIOR
Towards an understanding of cyber crime final
Seminar on Cyber Crime
Computer crimes

What's hot (20)

PPTX
Cyber Crime
PPT
Cybercrime
PPTX
Cybercrime
PPT
Cyber Crime-The New War of the 21st Century
PPTX
Power point cybercrime
PPTX
Cyber crime social media &; family
PPTX
Computer Crimes
PPTX
Cyber terrorism
PPTX
Cyber Space
PPTX
Cybercrimes
PPTX
Cyber crime
PPTX
Final ppt
PPTX
Cyberterrorism
PDF
Hackingppt 160730081605
PPTX
Cyber crime, cyber law and cyber ethics
PPTX
Name parul
PPT
Cyber Crimes
PPTX
Introduction to cybercrime
PPTX
Cyber terrorism
PPT
Cyber crime faizan project
Cyber Crime
Cybercrime
Cybercrime
Cyber Crime-The New War of the 21st Century
Power point cybercrime
Cyber crime social media &; family
Computer Crimes
Cyber terrorism
Cyber Space
Cybercrimes
Cyber crime
Final ppt
Cyberterrorism
Hackingppt 160730081605
Cyber crime, cyber law and cyber ethics
Name parul
Cyber Crimes
Introduction to cybercrime
Cyber terrorism
Cyber crime faizan project
Ad

Similar to 1.3 Understanding cyber crimes in detail (20)

PPT
unit 1. introduction to cyber crime.ppt
PPTX
PPTX
First Lecture- Cyber Security-Bangladesh.pptx
PPTX
Cyber Security PPT and how to be aware from hackers
PPTX
Unit one of cybersecurity for first year students
PPTX
Cyber crime
PPTX
introductiontocybercrimvvvvv63702-lva1-app6892.pptx
PDF
Ch 1 intro to cyber crime and cyber security.pdf
PPTX
Presentation.pptx
PPTX
Cyber security for engg students and diploma
PPT
Cyber Crime
PDF
Cyber Crime
PPT
Module 1 cyber security and foundation of security
PPTX
Cyber crime
PPT
PPTX
cybersecurity subject chapter 1 lec 1-5.pptx
PDF
Cyber Security U-1 ONE SHOT (NEW) Notes_c7ff765d-5cc7-4213-b668-842b59eb9ee5.pdf
PPTX
Cyber Secuirty Fully explained Lecture Notes
PPTX
Cyber crime and its types
PDF
cybercrimeandtypes-19101817340 2.pdf
unit 1. introduction to cyber crime.ppt
First Lecture- Cyber Security-Bangladesh.pptx
Cyber Security PPT and how to be aware from hackers
Unit one of cybersecurity for first year students
Cyber crime
introductiontocybercrimvvvvv63702-lva1-app6892.pptx
Ch 1 intro to cyber crime and cyber security.pdf
Presentation.pptx
Cyber security for engg students and diploma
Cyber Crime
Cyber Crime
Module 1 cyber security and foundation of security
Cyber crime
cybersecurity subject chapter 1 lec 1-5.pptx
Cyber Security U-1 ONE SHOT (NEW) Notes_c7ff765d-5cc7-4213-b668-842b59eb9ee5.pdf
Cyber Secuirty Fully explained Lecture Notes
Cyber crime and its types
cybercrimeandtypes-19101817340 2.pdf
Ad

More from Navjyotsinh Jadeja (8)

PPTX
what is cyber crime and how it started
PPTX
Software myths | Software Engineering Notes
PPTX
Market basket analysis | Association Rules Mining | R Programming
PPTX
M2M vs IoT: The Key Differences and Similarities
PPTX
CHATBOT using Facebook Messenger
PPTX
Risk Mitigation, Monitoring and Management Plan (RMMM)
PPTX
COCOMO model | How to calculate effort, staffing and Duration of Project
PPTX
How to make Gantt chart in Excel
what is cyber crime and how it started
Software myths | Software Engineering Notes
Market basket analysis | Association Rules Mining | R Programming
M2M vs IoT: The Key Differences and Similarities
CHATBOT using Facebook Messenger
Risk Mitigation, Monitoring and Management Plan (RMMM)
COCOMO model | How to calculate effort, staffing and Duration of Project
How to make Gantt chart in Excel

Recently uploaded (20)

PPT
Understanding the Impact of the Cyber Act
PDF
Vinayaka Mission Law School Courses and Infrastructure.pdf
PPTX
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
PPT
Understanding the Impact of the Cyber Act
PDF
algor mortis or cooling of body after death THANATOLOGY
PPTX
PART-3-FILIPINO-ADMINISTRATIVE-CULTURE.pptx
PDF
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
PPTX
Lecture Notes on Family Law - Knowledge Area 5
PPT
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
PPTX
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
PPT
wipo: IP _smes_kul_06_www_6899913 (1).ppt
PPTX
Digital Security in Cyber Law and Mitigating Cyberxrimes
PDF
New York State Bar Association Journal, September 2014
PPTX
Lecture Notes on Family Law - Knowledge Area 5
PPTX
Learning-Plan-4-Core-Principles.pptx htts
PDF
Plausibility - A Review of the English and EPO cases
PDF
A SEP and FRAND Overview 13 Aug 2024.pdf
PDF
CRIMINAL PROCEDURE BY HON. JUSTICE BAH.pdf
PPTX
Income under income Tax Act..pptx Introduction
PPT
looking_into_the_crystal_ball - Merger Control .ppt
Understanding the Impact of the Cyber Act
Vinayaka Mission Law School Courses and Infrastructure.pdf
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
Understanding the Impact of the Cyber Act
algor mortis or cooling of body after death THANATOLOGY
PART-3-FILIPINO-ADMINISTRATIVE-CULTURE.pptx
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
Lecture Notes on Family Law - Knowledge Area 5
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
wipo: IP _smes_kul_06_www_6899913 (1).ppt
Digital Security in Cyber Law and Mitigating Cyberxrimes
New York State Bar Association Journal, September 2014
Lecture Notes on Family Law - Knowledge Area 5
Learning-Plan-4-Core-Principles.pptx htts
Plausibility - A Review of the English and EPO cases
A SEP and FRAND Overview 13 Aug 2024.pdf
CRIMINAL PROCEDURE BY HON. JUSTICE BAH.pdf
Income under income Tax Act..pptx Introduction
looking_into_the_crystal_ball - Merger Control .ppt

1.3 Understanding cyber crimes in detail