SlideShare a Scribd company logo
CYBER CRIME
Here is where your presentation begins
CONTENTS
1. INTRODUCTION
2. WHAT IS CYBER CRIME
2.1 REASONS FOR CYBER CRIME
2.2 WHO ARE CYBER CRIMINALS
2.3 CATEGORIES OF CYBER CRIME
2.4 VARIOUS CATEGORIES OF CYBER CRIME
3. TYPES OF CYBER CRIMES
4. PRECAUTIONS TO PREVENT CYBER CRIME
5. ADVANTAGES AND DISADVANTAGES
6. CONCLUSION
WHAT IS CYBER CRIME
• Cybercrime is nothing but where the computer used as
an object or subject of crime.
• Crime committed using a computer and the internet to
steal a person’s identity.
• Illegal imports.
• Malicious programs
WHAT IS CYBER CRIME
"Offences that are committed against individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the victim or cause physical or mental
harm, or loss, to the victim directly or indirectly, using modern telecommunication
networks such as Internet (networks including chat rooms, emails, notice boards and
groups) and mobile phones (SMS/MMS)"
CYBER CRIMINALS
Those who are doing crimes by using the computer as an target or object.
• Children and adolescents between the age group of 6 – 18 years
• Organised hackers
• Professional hackers / crackers
• Dissatisfied employees
Categories Cyber
crimes
• Cyber crimes can be basically divided into 3 major categories:
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government.
Against Person
• Cybercrimes committed against persons include various
crimes like transmission of child pornography,
harassment of any one with the use of a computer such
as email, and cyber stalking.
• The distribution, posting, and dissemination of absence
material including pornography, and child pornography
constitutes one of the most important cybercrimes
known today. The potential harm of such a crime to
humanity can hardly be overstated.
Against Property
The second category of cyber crime is that of cybercrimes
against all forms of property. These crimes include
unauthorized computer trespassing through cyberspace,
computer vandalism, transmission of harmful programs, and
unauthorized possessions of computerized information.
Against
Government
• The third category of cybercrimes relate to cybercrimes against government
.cyber terrorism is one distinct kind of crime in this category . The growth of
internet has shown that the medium of cyberspace is being used by individuals
and groups to the international governments also threaten the citizens of a
country.
• This crime manifests itself into terrorism when an individual “cracks “ into a
government of military maintained website.
Types of Cyber
Crime
• Hacking • Denial OF Service Attack • Virus Dissemination • Computer Forgery •
Credit Card Fraud • Phishing • Spoofing • Cyber Stalking • Threatening • Salami
attack
Hacking
Hacking in simple terms means an illegal instruction into a
computer system and/or network. It is also known as
CRACKING.
Hacking involves gaining unauthorized access to a computer and
altering the system in such a way as to permit continued
access, along with changing the configuration, purpose, or
operation of the target machine, all without the knowledge or
approval of the systems owners.
Government websites are the hot targets of the hackers due to the
press coverage, it receives. Hackers enjoy the media coverage..
The hackers may be classified as:
White Hat: white hat hackers are the persons who hack the system to find the
security vulnerabilities of a system and notify to the organizations so that a
preventive action can be taken to protect the system from outside hackers.
White hat hackers may be paid employee of an organization who is employed
to find the security loop-holes, or may be a freelancer who just wants to prove
his mantle in this field. They are popular known as ethical hackers.
Black Hat: in contrast to the white hat, the black hat hack the system with ill
intentions. They may hack the system for social, political or economically
motivated intentions. They find the security loopholes the system, and keep the
information themselves and exploit the system for personal or organizational
benefits till organization whose system is compromised is aware of this, and
apply security patches. They are popularly known as crackers.
Grey Hat: Grey hat hackers find out the security vulnerabilities and report to the
site administrators and offer the fix of the security bug for a consultancy fee.
Blue hat: A blue hat hacker is someone outside computer security consulting firms
who is used to bug-test a system prior to its launch, looking for exploits so they
can be closed.
Forgery and
Counterfeiting
It is a use of computer to forgery and counterfeiting is a
document. With the advancement in the hardware and the
software, it is possible to produce counterfeit which matches
the original document to such an extent that it is not possible
to judge the authenticity of the document without expert
judgement.
Software Piracy and
Crime related to IPRs
Software piracy is an illegal reproduction and distribution for
personal use or business. It comes under crime related to IPR
infringement.
Some of the other crimes under IPR infringement are: download
of songs, downloading movies, etc.
Denial of Service
(“DoS”)
A Denial of Service (“DoS”) attack is a rather primitive technique that overwhelms
the resources of the target computer which results in the denial of server access
to other computers. There are several different techniques that hackers use to
“bring down” a server.
Virus
Dissemination
• This category of criminal activity involves either direct or search unauthorized
access to computer system by introducing new programs known as viruses,
worms or logic bombs. The unauthorized modification suppression or erasure of
computer data or functions with the Internet to hinder normal functioning of the
system is clearly a criminal activity and is commonly referred to as computer
sabotage.
Computer forgery
• This happens when data is altered which is stored in documents that are
in computerized form. Computers however can also be used as
instruments for committing forgery. A new generation of fraudulent
alteration or duplication emerged when computerized color laser
copies became available.
Credit Card
Fraud
• Modern business is quickly replacing cash with deposits transacted on computer
system creating computer fraud. Credit card information as well as personal
and financial information on credit card has been frequently targeted by
organized criminal crimes. Assets represented in data format often have a
considerably higher value than traditionally economic assets resulting in
potentially greater economic class.
Phishing
• Phishing, the mass distribution of “spoofed” e-mail messages, which appear to
come from banks, insurance agencies, retailers or credit card companies and
are designed to fool recipients into divulging personal data such as account
names, passwords, or credit card numbers.
Spoofing
• Getting one computer on a network to pretend to have the identity of
another computer, usually one with special access privileges , so as to
obtain access to the other computers on the network.
• The sender address and other parts of the e-mail header are altered .
From, Return-Path and Reply-To fields
• Although the e-mail appears to come from the address indicated in
the From field it actually comes from another source.
Prevention
• Antivirus
• Use cryptographic signatures
CYBER.pptx
Cyber stalking
• Cyber stalking is a new form of internet crime in our society when a person is
pursued or followed online. A cyber stalker doesn’t physically follow his victim;
he does it virtually by following his online activity to harvest information about
the stalk and harass him or her and make threats using verbal intimidation. It’s
an invasion of one’s online privacy.
Threatening
• The criminal sends threatening email or comes in contact in chat rooms with
victim.
Salami attack
 A series of minor attacks that together results in a larger attack
 Used for financial crimes in which criminals steal money or resources
a bit at a time from a system
 Criminal makes such program that deducts small amount like Rs. 2.50
per month from the account of all the customer of the Bank and
deposit the same in his account. In this case no account holder will
approach the bank for such small amount but criminal gains huge
amount.
SPAMMING
• Sending of unsolicited and commercial bulk message over the internet is
known as spamming. An email can be classified as spam, if it meets
following criteria:
Mass mailing:- the email is not targeted to one particular person but to a
large number of peoples.
Anonymity:- The real identify of the person not known
Unsolicited:- the email is neither expected nor requested for the recipient.
• These spams not only irritate the recipients and overload the network
but also waste the time and occupy the valuable memory space of the
mailbox.
Cross Site Scripting
It is an activity which involves injecting a malicious client side script into a trusted
website. As soon as the browser executes the malicious script, the malicious
script gets access to the cookies and other sensitive information and sent to
remote servers.
Now this information can be use to gain financial benefit or physical access to a
system for personal interest.
Online Auction
Fraud
There are many genuine websites who offers online auction over
internet.
Taking the advantage of the reputation of these websites, some
of the cyber criminals lure the customers to online auction
fraud schemes which often lead to either over payment of the
product or the item is never delivered once the payment is
made.
Cyber Squatting
It is an act of reserving the domain names of someone else’s trademark with intent
to sell it afterwards to the organization who is the owner of the trademark at a
higher price.
Logic Bombs
These are malicious code inserted into legitimate software. The malicious action is
triggered by some specific condition. If the conditions holds true in future, the
malicious action begins and based on the action defined in the malicious code,
they either destroy the information stored in the system or make system
unusable.
Web Jacking
• The hacker gain access to a website of an organization and
either blocks it or modify it to serve political, economical or
social interest.
• The recent examples of web jacking are some of the websites
of the educational institutes were hacked by Pakistani hackers
and an animation which contains Pakistani flags were flashed
in the homepage of these websites.
• Another example is Indian hackers hacked website of Pakistani
railways and flashed Indian flag in the homepage for several
hours on the occasion of Independence Day of India in 2014.
Internet Time Thefts
Hacking the username and password of ISP of an individual and
surfing the internet at his cost is Internet Time Theft.
DATA DIDDLING
• Changing of data before or during entry into the computer system
• Forging or counterfeiting documents used for data entry
• Exchanging valid disks and tapes with modified replacements.
Prevention:
• Regular Audits
• Supervising employees
Prevention of cyber crime
• Avoid disclosing your identity to any strangers.
• Always use latest antivirus software to guard against virus
attacks.
• Never send your credit card number to any site which is not
secured.
• Use of firewall
• Change passwords frequently
• Uninstall unnecessary software
• Maintain backup
• Avoiding use of Unauthorized software.
• Avoid opening of unknown email.
• Use internet filtering software.
• Data Level Security (Using encrypting software's).
• Don't respond to harassing or negative messages.
• Get out of uncomfortable or hostile situations quickly.
• Save offending messages.
• Learn more about Internet privacy.
Advantages and Disadvantages
Disadvantages:
• Improved hacker speed and ability.
• Interconnected computers.
• Improved viruses, malware and worms.
• Increase in “cyber warfare” possibly.
• More anonymity between hackers
Advantages:
• Improved security of cyberspace.
• Increase in cyber defense.
• Increase in cyber speed.
• Allows more options to save data.
• Better response time to national
crisis.

More Related Content

PPTX
Cyber crime
PPTX
Cyber crime
PPTX
Cyber crime-140128140443-phpapp02 (1)
PPTX
Cyber crime and its types
PDF
cybercrimeandtypes-19101817340 2.pdf
DOC
English in written
PPT
Cyber Security and Cyber Awareness
PPTX
Cybercrime: A Seminar Report
Cyber crime
Cyber crime
Cyber crime-140128140443-phpapp02 (1)
Cyber crime and its types
cybercrimeandtypes-19101817340 2.pdf
English in written
Cyber Security and Cyber Awareness
Cybercrime: A Seminar Report

Similar to CYBER.pptx (20)

PPTX
Cyber crime
PPTX
cs computer notes of studies in education
PDF
Ch 1 intro to cyber crime and cyber security.pdf
PPT
Cyber crime
DOC
111cyber crimes
DOCX
Cyber crime in pakistan by zubair
PPSX
Cyber crime and cyber security
PPT
unit 1. introduction to cyber crime.ppt
PPTX
PDF
Module 1 Introduction to cryptography...
PPTX
Introduction.pptx
PPTX
Cyber-crime and cyber security PPT.pptx
PDF
Cyber crime
PPTX
Cybercrime 111205224958-phpapp02
PPTX
Cyber Crime
DOCX
Cyber crime correct
PPTX
Cybercrimes
PPTX
Cybercrime
PPTX
Cybercrime
PPTX
Cybercrime
Cyber crime
cs computer notes of studies in education
Ch 1 intro to cyber crime and cyber security.pdf
Cyber crime
111cyber crimes
Cyber crime in pakistan by zubair
Cyber crime and cyber security
unit 1. introduction to cyber crime.ppt
Module 1 Introduction to cryptography...
Introduction.pptx
Cyber-crime and cyber security PPT.pptx
Cyber crime
Cybercrime 111205224958-phpapp02
Cyber Crime
Cyber crime correct
Cybercrimes
Cybercrime
Cybercrime
Cybercrime
Ad

Recently uploaded (20)

PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
DOCX
573137875-Attendance-Management-System-original
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PDF
PPT on Performance Review to get promotions
PDF
Well-logging-methods_new................
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Sustainable Sites - Green Building Construction
Foundation to blockchain - A guide to Blockchain Tech
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Embodied AI: Ushering in the Next Era of Intelligent Systems
OOP with Java - Java Introduction (Basics)
Structs to JSON How Go Powers REST APIs.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Lesson 3_Tessellation.pptx finite Mathematics
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
573137875-Attendance-Management-System-original
Arduino robotics embedded978-1-4302-3184-4.pdf
UNIT 4 Total Quality Management .pptx
PPT on Performance Review to get promotions
Well-logging-methods_new................
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Ad

CYBER.pptx

  • 1. CYBER CRIME Here is where your presentation begins
  • 2. CONTENTS 1. INTRODUCTION 2. WHAT IS CYBER CRIME 2.1 REASONS FOR CYBER CRIME 2.2 WHO ARE CYBER CRIMINALS 2.3 CATEGORIES OF CYBER CRIME 2.4 VARIOUS CATEGORIES OF CYBER CRIME 3. TYPES OF CYBER CRIMES 4. PRECAUTIONS TO PREVENT CYBER CRIME 5. ADVANTAGES AND DISADVANTAGES 6. CONCLUSION
  • 3. WHAT IS CYBER CRIME • Cybercrime is nothing but where the computer used as an object or subject of crime. • Crime committed using a computer and the internet to steal a person’s identity. • Illegal imports. • Malicious programs
  • 4. WHAT IS CYBER CRIME "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)"
  • 5. CYBER CRIMINALS Those who are doing crimes by using the computer as an target or object. • Children and adolescents between the age group of 6 – 18 years • Organised hackers • Professional hackers / crackers • Dissatisfied employees
  • 6. Categories Cyber crimes • Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government.
  • 7. Against Person • Cybercrimes committed against persons include various crimes like transmission of child pornography, harassment of any one with the use of a computer such as email, and cyber stalking. • The distribution, posting, and dissemination of absence material including pornography, and child pornography constitutes one of the most important cybercrimes known today. The potential harm of such a crime to humanity can hardly be overstated.
  • 8. Against Property The second category of cyber crime is that of cybercrimes against all forms of property. These crimes include unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs, and unauthorized possessions of computerized information.
  • 9. Against Government • The third category of cybercrimes relate to cybercrimes against government .cyber terrorism is one distinct kind of crime in this category . The growth of internet has shown that the medium of cyberspace is being used by individuals and groups to the international governments also threaten the citizens of a country. • This crime manifests itself into terrorism when an individual “cracks “ into a government of military maintained website.
  • 10. Types of Cyber Crime • Hacking • Denial OF Service Attack • Virus Dissemination • Computer Forgery • Credit Card Fraud • Phishing • Spoofing • Cyber Stalking • Threatening • Salami attack
  • 11. Hacking Hacking in simple terms means an illegal instruction into a computer system and/or network. It is also known as CRACKING. Hacking involves gaining unauthorized access to a computer and altering the system in such a way as to permit continued access, along with changing the configuration, purpose, or operation of the target machine, all without the knowledge or approval of the systems owners. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage..
  • 12. The hackers may be classified as: White Hat: white hat hackers are the persons who hack the system to find the security vulnerabilities of a system and notify to the organizations so that a preventive action can be taken to protect the system from outside hackers. White hat hackers may be paid employee of an organization who is employed to find the security loop-holes, or may be a freelancer who just wants to prove his mantle in this field. They are popular known as ethical hackers. Black Hat: in contrast to the white hat, the black hat hack the system with ill intentions. They may hack the system for social, political or economically motivated intentions. They find the security loopholes the system, and keep the information themselves and exploit the system for personal or organizational benefits till organization whose system is compromised is aware of this, and apply security patches. They are popularly known as crackers. Grey Hat: Grey hat hackers find out the security vulnerabilities and report to the site administrators and offer the fix of the security bug for a consultancy fee. Blue hat: A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed.
  • 13. Forgery and Counterfeiting It is a use of computer to forgery and counterfeiting is a document. With the advancement in the hardware and the software, it is possible to produce counterfeit which matches the original document to such an extent that it is not possible to judge the authenticity of the document without expert judgement.
  • 14. Software Piracy and Crime related to IPRs Software piracy is an illegal reproduction and distribution for personal use or business. It comes under crime related to IPR infringement. Some of the other crimes under IPR infringement are: download of songs, downloading movies, etc.
  • 15. Denial of Service (“DoS”) A Denial of Service (“DoS”) attack is a rather primitive technique that overwhelms the resources of the target computer which results in the denial of server access to other computers. There are several different techniques that hackers use to “bring down” a server.
  • 16. Virus Dissemination • This category of criminal activity involves either direct or search unauthorized access to computer system by introducing new programs known as viruses, worms or logic bombs. The unauthorized modification suppression or erasure of computer data or functions with the Internet to hinder normal functioning of the system is clearly a criminal activity and is commonly referred to as computer sabotage.
  • 17. Computer forgery • This happens when data is altered which is stored in documents that are in computerized form. Computers however can also be used as instruments for committing forgery. A new generation of fraudulent alteration or duplication emerged when computerized color laser copies became available.
  • 18. Credit Card Fraud • Modern business is quickly replacing cash with deposits transacted on computer system creating computer fraud. Credit card information as well as personal and financial information on credit card has been frequently targeted by organized criminal crimes. Assets represented in data format often have a considerably higher value than traditionally economic assets resulting in potentially greater economic class.
  • 19. Phishing • Phishing, the mass distribution of “spoofed” e-mail messages, which appear to come from banks, insurance agencies, retailers or credit card companies and are designed to fool recipients into divulging personal data such as account names, passwords, or credit card numbers.
  • 20. Spoofing • Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges , so as to obtain access to the other computers on the network. • The sender address and other parts of the e-mail header are altered . From, Return-Path and Reply-To fields • Although the e-mail appears to come from the address indicated in the From field it actually comes from another source. Prevention • Antivirus • Use cryptographic signatures
  • 22. Cyber stalking • Cyber stalking is a new form of internet crime in our society when a person is pursued or followed online. A cyber stalker doesn’t physically follow his victim; he does it virtually by following his online activity to harvest information about the stalk and harass him or her and make threats using verbal intimidation. It’s an invasion of one’s online privacy.
  • 23. Threatening • The criminal sends threatening email or comes in contact in chat rooms with victim.
  • 24. Salami attack  A series of minor attacks that together results in a larger attack  Used for financial crimes in which criminals steal money or resources a bit at a time from a system  Criminal makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
  • 25. SPAMMING • Sending of unsolicited and commercial bulk message over the internet is known as spamming. An email can be classified as spam, if it meets following criteria: Mass mailing:- the email is not targeted to one particular person but to a large number of peoples. Anonymity:- The real identify of the person not known Unsolicited:- the email is neither expected nor requested for the recipient. • These spams not only irritate the recipients and overload the network but also waste the time and occupy the valuable memory space of the mailbox.
  • 26. Cross Site Scripting It is an activity which involves injecting a malicious client side script into a trusted website. As soon as the browser executes the malicious script, the malicious script gets access to the cookies and other sensitive information and sent to remote servers. Now this information can be use to gain financial benefit or physical access to a system for personal interest.
  • 27. Online Auction Fraud There are many genuine websites who offers online auction over internet. Taking the advantage of the reputation of these websites, some of the cyber criminals lure the customers to online auction fraud schemes which often lead to either over payment of the product or the item is never delivered once the payment is made.
  • 28. Cyber Squatting It is an act of reserving the domain names of someone else’s trademark with intent to sell it afterwards to the organization who is the owner of the trademark at a higher price.
  • 29. Logic Bombs These are malicious code inserted into legitimate software. The malicious action is triggered by some specific condition. If the conditions holds true in future, the malicious action begins and based on the action defined in the malicious code, they either destroy the information stored in the system or make system unusable.
  • 30. Web Jacking • The hacker gain access to a website of an organization and either blocks it or modify it to serve political, economical or social interest. • The recent examples of web jacking are some of the websites of the educational institutes were hacked by Pakistani hackers and an animation which contains Pakistani flags were flashed in the homepage of these websites. • Another example is Indian hackers hacked website of Pakistani railways and flashed Indian flag in the homepage for several hours on the occasion of Independence Day of India in 2014.
  • 31. Internet Time Thefts Hacking the username and password of ISP of an individual and surfing the internet at his cost is Internet Time Theft.
  • 32. DATA DIDDLING • Changing of data before or during entry into the computer system • Forging or counterfeiting documents used for data entry • Exchanging valid disks and tapes with modified replacements. Prevention: • Regular Audits • Supervising employees
  • 33. Prevention of cyber crime • Avoid disclosing your identity to any strangers. • Always use latest antivirus software to guard against virus attacks. • Never send your credit card number to any site which is not secured. • Use of firewall • Change passwords frequently • Uninstall unnecessary software • Maintain backup
  • 34. • Avoiding use of Unauthorized software. • Avoid opening of unknown email. • Use internet filtering software. • Data Level Security (Using encrypting software's). • Don't respond to harassing or negative messages. • Get out of uncomfortable or hostile situations quickly. • Save offending messages. • Learn more about Internet privacy.
  • 35. Advantages and Disadvantages Disadvantages: • Improved hacker speed and ability. • Interconnected computers. • Improved viruses, malware and worms. • Increase in “cyber warfare” possibly. • More anonymity between hackers Advantages: • Improved security of cyberspace. • Increase in cyber defense. • Increase in cyber speed. • Allows more options to save data. • Better response time to national crisis.