Cyber crime final
Harmful act against the public which the
wishes to prevent, and is punishable
by , , and/or .
Crime that involves a and
a
Stealing a person’s identity
Making Money
Harassing Someone
Getting Secret Records or Passwords
Assessing someone personal Data
Computer as a ; using a Computer to
commit real World Crime.
Computer as a ; using a Computer to
attack on other Computer
 Against Person
i. Hacking
ii. Harassment
Against Property
i. Intellectual property crimes
ii. Hacking Computer System
Against Government
i. Cyber Terrorism
ii. Information
Hacking
Computer Vandalism
Cyber Terrorism
Software Privacy
 Crime wherein a person’s computer is broken
into so that his personal or sensitive information
can be accessed
Also known as
Government websites are the hot targets of
hackers.
Damaging or destroying the data rather than
stealing or misusing
Transmitting Viruses; These are the programs
that attach themselves to a file and then
circulate from one computer to other.
The politically motivated use of computers
and information technology to cause severe
disruption or widespread fear.
Using Computer and Network to spread fear in
among civilians.
 Illegal copying, distribution, or use
of software
According to the Business Software Alliance
(BSA), about 36% of all software in current use
is stolen.
 Built to protect the privacy of its users
Cyber crime final
Use Antivirus Software’s
Uninstall Unnecessary Software
Maintain backup
Check security settings
Never give your full name or address to
strangers.
Cyber crime final
This Security will defend us from critical
attacks
Helps us to browse the safe website
Secure all the incoming and outgoing data on
our computer
Cyber crime final

More Related Content

PPT
28658043 cyber-terrorism
PPTX
Cyber Terrorism
PPTX
Shubhrat.presentationfor cybercrime.ppt
PPT
Cyber Terrorism Presentation
PPTX
Cyber Crime
PPTX
Cyber terrorism
PPT
Cyber terrorism
PPTX
Cyber terrorism by_Ali_Fahad
28658043 cyber-terrorism
Cyber Terrorism
Shubhrat.presentationfor cybercrime.ppt
Cyber Terrorism Presentation
Cyber Crime
Cyber terrorism
Cyber terrorism
Cyber terrorism by_Ali_Fahad

What's hot (20)

DOCX
document on cyber terrorism
PPTX
Cyberterrorism
PPTX
cyber crime & cyber law
PPTX
Customer Focused Government and Computer Security
PPTX
Introduction to cybercrime
PPTX
Cybercrime 111205224958-phpapp02
PPTX
Network security threats ahmed s. gifel
PDF
Cyber Security work shop by Kapil Mehrotra
PPTX
Cyber terrorism
PPTX
Cyber terrorism
PPT
Cyberterrorism final
DOC
Computer crimes
PPTX
Cybercrime
PPTX
Cyber terrorism
PPTX
Cyber crimes publicspeaking
PDF
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
PPTX
Cybercrime
PPTX
Cyber crime ppt for class 9th and 12th
PDF
Understanding and preventing cyber crime and its impact on your organisation
document on cyber terrorism
Cyberterrorism
cyber crime & cyber law
Customer Focused Government and Computer Security
Introduction to cybercrime
Cybercrime 111205224958-phpapp02
Network security threats ahmed s. gifel
Cyber Security work shop by Kapil Mehrotra
Cyber terrorism
Cyber terrorism
Cyberterrorism final
Computer crimes
Cybercrime
Cyber terrorism
Cyber crimes publicspeaking
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cybercrime
Cyber crime ppt for class 9th and 12th
Understanding and preventing cyber crime and its impact on your organisation
Ad

Viewers also liked (12)

PDF
Velocidad mes 80m
PPTX
K10715 ankit kumar verma centrifugal pump
PPT
Essay Eva Peron
DOCX
Lierature review for nation branding
PPTX
Introduction Department of Neurology CPC
DOCX
Linux Admin
PPTX
Anatomía de los me
PPTX
Why is your short film needed?
 
PPTX
Beta lactam antibiotics.
PPTX
Light and Dark Adaptation
PDF
Nervio Oculomotor (Iii Par Craneal)
Velocidad mes 80m
K10715 ankit kumar verma centrifugal pump
Essay Eva Peron
Lierature review for nation branding
Introduction Department of Neurology CPC
Linux Admin
Anatomía de los me
Why is your short film needed?
 
Beta lactam antibiotics.
Light and Dark Adaptation
Nervio Oculomotor (Iii Par Craneal)
Ad

Similar to Cyber crime final (20)

PPT
Cyber Crime and Security
PPT
Sahilmod 120315100301-phpapp01
PPT
Cybercrime the emerging threat
PPT
CYBER CRIME AND SECURITY
PPT
Cyber crimes and their prevention
PPT
Cyber Crime
PPTX
It presentation cyber crime
PPTX
Cybercrime
PPTX
Module vi mis
PPTX
computer security and its relationship to computer forensic
PDF
Cyber Law & Forensics
PPT
Cyber Crime and Security
PPTX
CYBER CRIME AND SECURITY1.pptx
PPTX
Cyber crime and Security
PPTX
CYBER CRIME - A Threat To Internet Users
PDF
cybercrimeandtypes-19101817340 2.pdf
PPTX
Cyber crime and its types
PPTX
Cyber Crime
PPTX
Cyber Crime and Security Presentation
PPTX
Cyber Crime and Security
Sahilmod 120315100301-phpapp01
Cybercrime the emerging threat
CYBER CRIME AND SECURITY
Cyber crimes and their prevention
Cyber Crime
It presentation cyber crime
Cybercrime
Module vi mis
computer security and its relationship to computer forensic
Cyber Law & Forensics
Cyber Crime and Security
CYBER CRIME AND SECURITY1.pptx
Cyber crime and Security
CYBER CRIME - A Threat To Internet Users
cybercrimeandtypes-19101817340 2.pdf
Cyber crime and its types
Cyber Crime
Cyber Crime and Security Presentation

More from Zeeshan Ahmed (8)

PPTX
Ultrasound
PPTX
Gene mapping ppt
PPTX
Dna fingerprinting
PPTX
DNA fingerprinting
PPTX
Animal rights
PPTX
Application of bio informatics
PPTX
Tissue culturing
PPTX
Transposons ppt
Ultrasound
Gene mapping ppt
Dna fingerprinting
DNA fingerprinting
Animal rights
Application of bio informatics
Tissue culturing
Transposons ppt

Recently uploaded (20)

PDF
DIGITAL MARKETING CONTENTS INCLUDING DEFINTIONS AND IMPORTANTS
PDF
Social Media Marketing Company In Nagpur
PDF
The Effect of Internships on Career Preparedness as Perceived by Criminology ...
PDF
Does Ownership Structure Play an Important Role in the Banking Industry?
DOC
ASU毕业证学历认证,圣三一拉邦音乐与舞蹈学院毕业证留学本科毕业证
PDF
What is TikTok Cyberbullying_ 15 Smart Ways to Prevent It.pdf
PDF
Effectiveness of Good Corporate Governance and Corporate Social Responsibilit...
PPTX
Eric Starker - Social Media Portfolio - 2025
PDF
The Black Turn Best Music Distribution In India
PDF
Dominate the Explore Page Level Me Up...
PDF
The Effect of Compensation and Work Environment on Employee Performance with ...
PDF
Implementation of Total Quality Management (TQM) in Plywood Production Contro...
PDF
Why Blend In When You Can Trend? Make Me Trend
PDF
Buy Verified Cryptocurrency Accounts - Lori Donato's blo.pdf
PDF
Optimizing Customer Lifetime Value (CLV) Prediction Models in Retail Banking ...
PDF
Online echo chambers, misinformation, disinformation, identity politics, how ...
PDF
A guide to using Social Media For Business
PDF
Organizational Culture and Leadership Style as Predictors of Organizational C...
PDF
Presentation-Popular-Culture-in-the-Philippines.pdf
PPTX
Lesson 3: person and his/her relationship with the others NSTP 1
DIGITAL MARKETING CONTENTS INCLUDING DEFINTIONS AND IMPORTANTS
Social Media Marketing Company In Nagpur
The Effect of Internships on Career Preparedness as Perceived by Criminology ...
Does Ownership Structure Play an Important Role in the Banking Industry?
ASU毕业证学历认证,圣三一拉邦音乐与舞蹈学院毕业证留学本科毕业证
What is TikTok Cyberbullying_ 15 Smart Ways to Prevent It.pdf
Effectiveness of Good Corporate Governance and Corporate Social Responsibilit...
Eric Starker - Social Media Portfolio - 2025
The Black Turn Best Music Distribution In India
Dominate the Explore Page Level Me Up...
The Effect of Compensation and Work Environment on Employee Performance with ...
Implementation of Total Quality Management (TQM) in Plywood Production Contro...
Why Blend In When You Can Trend? Make Me Trend
Buy Verified Cryptocurrency Accounts - Lori Donato's blo.pdf
Optimizing Customer Lifetime Value (CLV) Prediction Models in Retail Banking ...
Online echo chambers, misinformation, disinformation, identity politics, how ...
A guide to using Social Media For Business
Organizational Culture and Leadership Style as Predictors of Organizational C...
Presentation-Popular-Culture-in-the-Philippines.pdf
Lesson 3: person and his/her relationship with the others NSTP 1

Cyber crime final

  • 2. Harmful act against the public which the wishes to prevent, and is punishable by , , and/or .
  • 4. Stealing a person’s identity Making Money Harassing Someone Getting Secret Records or Passwords Assessing someone personal Data
  • 5. Computer as a ; using a Computer to commit real World Crime. Computer as a ; using a Computer to attack on other Computer
  • 6.  Against Person i. Hacking ii. Harassment Against Property i. Intellectual property crimes ii. Hacking Computer System Against Government i. Cyber Terrorism ii. Information
  • 8.  Crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed Also known as Government websites are the hot targets of hackers.
  • 9. Damaging or destroying the data rather than stealing or misusing Transmitting Viruses; These are the programs that attach themselves to a file and then circulate from one computer to other.
  • 10. The politically motivated use of computers and information technology to cause severe disruption or widespread fear. Using Computer and Network to spread fear in among civilians.
  • 11.  Illegal copying, distribution, or use of software According to the Business Software Alliance (BSA), about 36% of all software in current use is stolen.  Built to protect the privacy of its users
  • 13. Use Antivirus Software’s Uninstall Unnecessary Software Maintain backup Check security settings Never give your full name or address to strangers.
  • 15. This Security will defend us from critical attacks Helps us to browse the safe website Secure all the incoming and outgoing data on our computer