SlideShare a Scribd company logo
Computer
Crime
BY
Adeel Rasheed
Ibrar Manzoor
More Information Visit
https://chauhantricks.blogspot.com/
Computer
crime
Computer crimes refer to the use of
information technology for
illegal purposes or for unauthorized
access of a computer system
where the intent is to damage, delete or
alter the data present in
the computer. Even identity thefts,
misusing devices or electronic
frauds are considered to be computer
crimes.
Computer
Crime
Alternatively referred to as cyber crime,
e-crime, electronic crime, or hi-tech
crime.
“
○ Computer crime is an act performed by
a knowledgeable computer user,
sometimes referred to as a hacker that
illegally browses or steals a company's
or individual's private information. In
some cases, this person or group of
individuals may be malicious and
destroy or otherwise corrupt the
computer or data files.
5
Examples of
computer crimes
○ Child
pornography -
○ Making or distributing child
pornography.
6
Copyright
violation
Stealing or using another
person's Copyrighted materi
al without permission.
Cracking
Breaking or deciphering codes that are
being used to protect data.
Cyber
terrorism
Hacking, threats, and blackmailing
towards a business or person.
Cyberbully or
Cyberstalking
Harassing or stalking others online.
Cybersquatting
Setting up a domain of another person or
company with the sole intentions of
selling it to them later at a premium
price.
Creating
Malware
Writing, creating, or distributing malware
(e.g., viruses and spyware.)
Denial of
Service attack
Overloading a system with so many
requests it cannot serve normal
requests.
Espionage
Spying on a person or business.
Fraud
Manipulating data, e.g., changing banking
records to transfer money to an
account or participating in credit
card fraud.
Harvesting
Collect account or other account related
information on other people.
Human
trafficking
Participating in the illegal act of buying or
selling other humans.
Identity
theft
Pretending to be someone you are not.
Illegal
sales
Buying or selling illicit goods online
including drugs, guns, and
psychotropic substances.
Intellectual
property theft
Stealing practical or conceptual
information developed by another
person or company.
IPR
violation
An intellectual property rights violation is
any infringement of another's
Copyright, patent, or trademark.
Phishing
Deceiving individuals to gain private or
personal information about that
person.
Salami
slicing
Stealing tiny amounts of money from
each transaction.
Scam
Tricking people into believing something
that is not true.
Slander
Posting libel or slander against another
person or company.
Software
piracy
Copying, distributing, or
using software that is Copyrighted
that you did not purchase.
Spamming
Distributed unsolicited e-mail to dozens
or hundreds of different addresses.
Spoofing
Deceiving a system into thinking you are
someone you really are not.
Typosquatting
Setting up a domain that is a misspelling
of another domain.
Unauthorized
access
Gaining access to systems you have no
permission to access.
Wiretapping
Connecting a device to a phone line to
listen to conversations.
Computer Crime

More Related Content

PPTX
Cyber crime
PPTX
Cyber crime & security
PPT
Cyber Crime and Security
PPT
Protecting children in cyberspace
PPTX
Cyber crime
PPTX
Cyber Crime
PPTX
Social media privacy and safety
PPTX
Cyber security ppt final
Cyber crime
Cyber crime & security
Cyber Crime and Security
Protecting children in cyberspace
Cyber crime
Cyber Crime
Social media privacy and safety
Cyber security ppt final

What's hot (20)

PPTX
Cyber crime and security
PPTX
Cyber crime.pptx
PPTX
Cyber security presentation
PPTX
Cyber Crime and Security
PDF
Cyber Forensics Module 1
PPTX
Cyber crime ✔
PPTX
Cyber Crime
PPTX
Cyber security
PPTX
Cybercrime and Security
PPSX
Cyber crime and cyber security
PPTX
Ppt on cyber security
PDF
Ethical and Social Issues in ICT
PPTX
Introduction to Cybersecurity Fundamentals
PPTX
CYBER SECURITY
PPT
A Quick Online Safety Presentation
PPTX
Privacy issues and internet privacy
PPTX
Cyber security for children
PPT
“Privacy Today” Slide Presentation
PPTX
Cyber crime
PDF
Security Awareness Training
Cyber crime and security
Cyber crime.pptx
Cyber security presentation
Cyber Crime and Security
Cyber Forensics Module 1
Cyber crime ✔
Cyber Crime
Cyber security
Cybercrime and Security
Cyber crime and cyber security
Ppt on cyber security
Ethical and Social Issues in ICT
Introduction to Cybersecurity Fundamentals
CYBER SECURITY
A Quick Online Safety Presentation
Privacy issues and internet privacy
Cyber security for children
“Privacy Today” Slide Presentation
Cyber crime
Security Awareness Training
Ad

Similar to Computer Crime (20)

PPTX
Computer crime
PPTX
Republic Act 10175 - Cyber Crime Prevention Act of 2012
PPS
Cyber crime in WORLD
PPTX
Cyber crime
DOCX
Copyright patent& intellectual property
PPTX
Classifying Cybercrimes
PPTX
CYBER CRIME - A Threat To Internet Users
PPTX
Kinds of cybercrime (Social Networking for Social integration .pptx
PPTX
CYBER.pptx
PPTX
computer law.pptx
PPTX
It presentation cyber crime
PPTX
Cyber Crime and Cyber Law of India BY Vinay
PPTX
PPTX
Cyber crime against property
PPTX
Introduction.pptx
PPTX
Presentation_on_cybersecurity_AKTU_UP.pptx
PPTX
Introduction to cybercrime
PDF
Cyber crime a potential threat and remedies
PPTX
Cyber crime
PPTX
Cyber crime & security
Computer crime
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Cyber crime in WORLD
Cyber crime
Copyright patent& intellectual property
Classifying Cybercrimes
CYBER CRIME - A Threat To Internet Users
Kinds of cybercrime (Social Networking for Social integration .pptx
CYBER.pptx
computer law.pptx
It presentation cyber crime
Cyber Crime and Cyber Law of India BY Vinay
Cyber crime against property
Introduction.pptx
Presentation_on_cybersecurity_AKTU_UP.pptx
Introduction to cybercrime
Cyber crime a potential threat and remedies
Cyber crime
Cyber crime & security
Ad

More from Adeel Rasheed (20)

PPTX
Multan to Sukkur Motorway (M5)
PPTX
Religious Conflict
DOCX
R Studio (Report)
DOCX
History of computer (1st to 5th Generations)
PPTX
CSS Cascade Style Sheet
PPTX
Zooming and Its Types
PPTX
User Interface & Its Types
DOCX
Questions About Android Application Development
PPTX
Human and Machine Learning
PPTX
Connection Establishment & Flow and Congestion Control
PPTX
IP Address - IPv4 & IPv6
PPTX
Privacy and Security Information
PPTX
Code of Conduct - Code of Practice & Standards
PPTX
Self Adaptive Systems
PPTX
Ethernet - LAN
PPTX
Synchronous and Asynchronous Transmission
PPTX
Classes and Objects in C#
DOCX
Intel Microprocessors 8086 Documentation
DOCX
Applications of Computer
DOCX
Hysteresis Loop
Multan to Sukkur Motorway (M5)
Religious Conflict
R Studio (Report)
History of computer (1st to 5th Generations)
CSS Cascade Style Sheet
Zooming and Its Types
User Interface & Its Types
Questions About Android Application Development
Human and Machine Learning
Connection Establishment & Flow and Congestion Control
IP Address - IPv4 & IPv6
Privacy and Security Information
Code of Conduct - Code of Practice & Standards
Self Adaptive Systems
Ethernet - LAN
Synchronous and Asynchronous Transmission
Classes and Objects in C#
Intel Microprocessors 8086 Documentation
Applications of Computer
Hysteresis Loop

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
cuic standard and advanced reporting.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Chapter 3 Spatial Domain Image Processing.pdf
A Presentation on Artificial Intelligence
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
cuic standard and advanced reporting.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Computer Crime