SlideShare a Scribd company logo
Cyber Crime
 White collar crime.
 Violent crime.
Crime committed using a computer and the internet to
steal a person’s identity or illegal imports or malicious
programs.
When Computer Is used:-
As a Target: using a computer to attack other computers.


As a weapon: using a computer to commit real world crimes.
 HACKING
 CHILD PORNOGRAPHY
 DENIAL OF SERVICE ATTACK
 VIRUS DISSEMINITION
 COMPUTER VANDALISM
 CYBER TERRORISM
 SOFTWARE PIRACY
Hacking in simple terms
means an illegal intrusion
into a computer system
and/or network. It is also
known as CRACKING.
Government websites are
the hot targets of the
hackers due to the press
coverage, it receives.
Hackers enjoy the media
coverage..
The Internet is being highly used by its abusers to reach
and abuse children sexually, worldwide. As more homes
have access to internet, more children would be using
the internet and more are the chances of falling victim to
the aggression of pedophiles.
 This is an act by the
  cyber criminal to
  make any host
  network unavailable
  for the guests.
  These attacks are
  mostly done by
  group of people.
     Malicious software that
    attaches itself to other
    software and destroys the
    data. (virus, worms, Trojan
    Horse, web jacking, e-mail
    bombing etc.)
Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism. Transmitting
virus: These are programs that attach themselves to a file
and then circulates the data or sometimes destroys it.
Terrorist attacks on the Internet is by distributed denial of
service attacks, hate websites and hate emails, attacks
on sensitive computer networks, etc. Technology savvy
terrorists are using 512-bit encryption, which is
impossible to decrypt.
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of
products intended to pass for the original.
  Internet security is a branch
      of computer security
 specifically related to
 the Internet.
 It's objective is to establish
 rules and measure to use
 against attacks over the
 Internet.
 Use antivirus software’s
 insert firewalls
 uninstall unnecessary software
 maintain backup
 check security settings
 Stay anonymous - choose a
  genderless screen name
 Never give your full name or
  address to strangers
 Learn ‘etiquettes' - follow it and
    expect it from others
   Don't respond to harassing or
    negative messages
   Get out of uncomfortable or
    hostile situations quickly
   Save offending messages
   Learn more about Internet
    privacy
 The cyber security will defend us from critical attacks.
 It helps us to browse the safe website.
 Internet security process all the incoming and outgoing
  data on our computer.
 security will defend from hacks and viruses.
Cyber Crime

More Related Content

PPTX
Cyber crime ✔
PPTX
Cyber crime.pptx
PPT
Computer Miss-use and Criminal Law
PPTX
Cyber crime ppt
PPTX
Internet privacy presentation
PPTX
Cyber crime & security
PPT
Cyber Crime and Security
PPTX
Cyber Crime
Cyber crime ✔
Cyber crime.pptx
Computer Miss-use and Criminal Law
Cyber crime ppt
Internet privacy presentation
Cyber crime & security
Cyber Crime and Security
Cyber Crime

What's hot (20)

PPT
PPTX
Social engineering
PPTX
Cyber Crime and Security
PPTX
Cyber crimes presentation
PPTX
Cyber Crime
PPTX
Cyber security ppt final
PPT
CYBER CRIME
PPTX
Cyber Crime And Security
PPTX
Cyber Crime and Security
PPTX
Phishing techniques
PPTX
Cyber Crime
PPTX
Cyber crime and security
PPT
All about Hacking
PPTX
Cyber Crime and Cyber Security
PPTX
Computer crime
PPTX
Cyber Security
PPT
Cyber crimes and their prevention
PPT
Cybercrime presentation
PPTX
Cybercrime a growing threat of 21 st century !!!
PPT
presentation on cyber crime and security
Social engineering
Cyber Crime and Security
Cyber crimes presentation
Cyber Crime
Cyber security ppt final
CYBER CRIME
Cyber Crime And Security
Cyber Crime and Security
Phishing techniques
Cyber Crime
Cyber crime and security
All about Hacking
Cyber Crime and Cyber Security
Computer crime
Cyber Security
Cyber crimes and their prevention
Cybercrime presentation
Cybercrime a growing threat of 21 st century !!!
presentation on cyber crime and security
Ad

Viewers also liked (6)

PDF
Bhutto vision of pakistan
PDF
Bhutto the man and the martyr
PDF
Bhutto a political biography
PDF
Pakistan and bhutto
PPTX
Benazir Income Support Programme (BISP)
PPTX
Hazard analysis and control
Bhutto vision of pakistan
Bhutto the man and the martyr
Bhutto a political biography
Pakistan and bhutto
Benazir Income Support Programme (BISP)
Hazard analysis and control
Ad

Similar to Cyber Crime (20)

PPT
cyber crime
PPT
Cybercrime the emerging threat
PPT
Cyber Security and Cyber Awareness
PPTX
Cybercrime 111205224958-phpapp02
PPTX
PPTX
Cyber crime and its types
PDF
cybercrimeandtypes-19101817340 2.pdf
PPTX
pravallika chowdary
PPTX
Cyber Crime and Security Presentation
PPTX
Cyber crime and Security
PPTX
CYBER CRIME - A Threat To Internet Users
PPTX
Cyber crime and security
PPT
Sahilmod 120315100301-phpapp01
PPTX
Cyber crime & law
PPTX
Cyber crime
PPTX
Cyber crime ppt
PPSX
Unit 1
PPTX
Cyber crime
PPTX
Cyber Crime
PPTX
Infocrimeppt
cyber crime
Cybercrime the emerging threat
Cyber Security and Cyber Awareness
Cybercrime 111205224958-phpapp02
Cyber crime and its types
cybercrimeandtypes-19101817340 2.pdf
pravallika chowdary
Cyber Crime and Security Presentation
Cyber crime and Security
CYBER CRIME - A Threat To Internet Users
Cyber crime and security
Sahilmod 120315100301-phpapp01
Cyber crime & law
Cyber crime
Cyber crime ppt
Unit 1
Cyber crime
Cyber Crime
Infocrimeppt

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
KodekX | Application Modernization Development
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
KodekX | Application Modernization Development
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
Chapter 3 Spatial Domain Image Processing.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Encapsulation theory and applications.pdf
NewMind AI Monthly Chronicles - July 2025
Machine learning based COVID-19 study performance prediction
Digital-Transformation-Roadmap-for-Companies.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)

Cyber Crime

  • 2.  White collar crime.  Violent crime.
  • 3. Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs.
  • 4. When Computer Is used:- As a Target: using a computer to attack other computers. As a weapon: using a computer to commit real world crimes.
  • 5.  HACKING  CHILD PORNOGRAPHY  DENIAL OF SERVICE ATTACK  VIRUS DISSEMINITION  COMPUTER VANDALISM  CYBER TERRORISM  SOFTWARE PIRACY
  • 6. Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage..
  • 7. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
  • 8.  This is an act by the cyber criminal to make any host network unavailable for the guests. These attacks are mostly done by group of people.
  • 9. Malicious software that attaches itself to other software and destroys the data. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 10. Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulates the data or sometimes destroys it.
  • 11. Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 12. Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 13.  Internet security is a branch of computer security specifically related to the Internet.  It's objective is to establish rules and measure to use against attacks over the Internet.
  • 14.  Use antivirus software’s  insert firewalls  uninstall unnecessary software  maintain backup  check security settings  Stay anonymous - choose a genderless screen name  Never give your full name or address to strangers
  • 15.  Learn ‘etiquettes' - follow it and expect it from others  Don't respond to harassing or negative messages  Get out of uncomfortable or hostile situations quickly  Save offending messages  Learn more about Internet privacy
  • 16.  The cyber security will defend us from critical attacks.  It helps us to browse the safe website.  Internet security process all the incoming and outgoing data on our computer.  security will defend from hacks and viruses.