SlideShare a Scribd company logo
CYBER CRIME AND MONEY
LAUNDERING
If we can defeat them sitting at
home……who needs to fight with tanks and
guns!!!!
Presented By
Final ppt
The internet in India is growing rapidly. It has given rise
to new opportunities in every field we can think of it
entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own
disadvantages is Cyber crime- illegal activity committed
on the internet.
INTERNET INTRODUCTION
Final ppt
CONTENTS
 Introduction.
 History.
 Cyber threat evolution.
 Categories of cyber crime.
 Types of cyber crime.
INTRODUCTION
Cyber crime is an
activity done using
computers and internet.
We can say that it is an
unlawful acts wherein the
computer either a tool or
target or both.
• The first recorded cyber crime took place in
1820.
• In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
• The first spam email took place in 1976 when it
was sent out over the ARPANET.
• The first virus was installed on an Apple
computer in 1982.
Final ppt
We can categorize cyber crime in two ways.
• The computer as a target :- using a computer to
attacks other computer, e.g. Hacking,
virus/worms attacks, Dos attack etc.
• The computer as a weapon :- using a computer
to commit real world crime e.g. cyber terrorism,
credit card fraud and pornography etc.
Final ppt
Hacking in simple terms
means an illegal intrusion
into a computer system or
network. It is also known as
CRACKING. Eg. Government
websites are the hot
targets of the hackers due
to the press coverage, it
receives. Hackers enjoy the
media coverage.
• Act by the criminal, who floods the bandwidth
of the victims network.
• Is his e-mail box with spam mail depriving him
of the services.
Malicious software that attaches itself to other
software or computer system and then propagates
itself to other computers via networks or disks.
(virus, worms, Trojan Horse, web jacking, e-mail
bombing etc)
• Damaging or destroying data rather than
stealing or misusing them is called cyber
vandalism. Transmitting virus: These are
programs that attach themselves to a file and
then circulate .
Terrorist attacks on the Internet is by distributed denial of
service attacks, hate websites and hate emails, attacks on
sensitive computer networks, etc. Technology savvy terrorists
are using 512-bit encryption, which is impossible to decrypt.
Ex. 26-11-2010
Theft of software through the illegal copying of
genuine programs or the counterfeiting and distribution
of products intended to pass for the original.
Phishing is just one of the many frauds on the Internet,
trying to fool people into parting with their money. Phishing
refers to the receipt of unsolicited emails by customers of
Financial Institutions
requesting them to
enter their Username
Password or other
personal information
to access their Account
for some reason.
The Internet is being highly used by its abusers to
reach and abuse children sexually, worldwide. As
more homes have access to internet, more children
would be using the internet and more are the
chances of falling victim to the aggression of
Pedophiles.
Final ppt
CONTENTS
 Introduction.
 Stages.
 Consequence.
 Evasion.
 Impact.
WHAT IS MONEY LAUNDERING?
Money laundering is the generic
process used to describe the
process by which criminals
disguise the original ownership
and control of the proceeds of
criminal conduct by making such
proceeds appeared to have
arrived from legitimate sources.
Stages Of Money Laundering
Stage 1 Placement: Where criminally derived funds
are introduced in the financial system
Stage 2 Layering: Where property ownership and
source of funds are disguised
Stage 3 integration : Laundered property becomes
legitimate
Consequences Of Money Laundering
• Increase In Crime And Corruption
• Weak Financial
Institutions
•Loss Of National
Reputation
•Economical Harm And
Detriment
Evasion Of Tax And Money Laundering
Tax evaders
launder their
money so they can
lie about where
the money and
assets have come
from
Money laundering has a very negative impact on the
Indian economy as well as the global economy in
terms of loss of funds, reputation and global ranking.
Impact Of Money Laundering
CONCLUSION
Each and every person uses internet and we feel we are
safe enough to use it. We don’t have to put much effort for
that. But criminal are there keeping eyes on your data.
So Always Try To Be Safe And Secure!!!
Reference :- www.google.com, Vipul Publication SY (A&F).
Final ppt
Questions?
Final ppt

More Related Content

PPTX
Cybercrimes
PPTX
Cyber crime
PPTX
Types Of Computer Crime
PPTX
Cyber Crime
PPTX
Cyber crime ppt new
PPTX
Cyber Crime
PPTX
Cyber crime social media &; family
Cybercrimes
Cyber crime
Types Of Computer Crime
Cyber Crime
Cyber crime ppt new
Cyber Crime
Cyber crime social media &; family

What's hot (20)

PPT
Cyber crime
PPT
Cybercrime
PPTX
Cyber crime
PPTX
Computer Crime
PPTX
Cyber crime lecture pp update
PPTX
Cybercrime
PPTX
Cyber crime
PPTX
Cyber Crime
PPTX
[Exposicion] Computer and Internet Crime
PPTX
Power point cybercrime
PDF
Computer crimes
PPTX
Computer Crimes
PPTX
Cyber crime
PPTX
Cyber Crime
PPTX
Cyber crime presentation school level
DOC
Cyber crime
PPTX
Cyber crimes among adolescents
PPTX
cyber crime
PPTX
Cyber crime-140128140443-phpapp02 (1)
PPTX
Cyber crime
Cyber crime
Cybercrime
Cyber crime
Computer Crime
Cyber crime lecture pp update
Cybercrime
Cyber crime
Cyber Crime
[Exposicion] Computer and Internet Crime
Power point cybercrime
Computer crimes
Computer Crimes
Cyber crime
Cyber Crime
Cyber crime presentation school level
Cyber crime
Cyber crimes among adolescents
cyber crime
Cyber crime-140128140443-phpapp02 (1)
Cyber crime
Ad

Viewers also liked (16)

PDF
Understanding the Latest Developments in Financial Fraud
PPTX
Financial Crimes
PDF
Anti Money Laundering
PPTX
Fraud: Understanding Fraud and Our Responsibilities
PPTX
Credit card fraud detection methods using Data-mining.pptx (2)
DOCX
Credit card fraud detection
PPT
Anti-money laundering presentation
PPTX
Fraud principles1
PDF
7 Keys to Fraud Prevention, Detection and Reporting
PPTX
Fraud in the Banking Sector
PDF
Fraud Detection presentation
PPTX
Credit card fraud detection
PPTX
Money laundering
PPTX
Anti money laundering
PPT
Presentation on fraud prevention, detection & control
Understanding the Latest Developments in Financial Fraud
Financial Crimes
Anti Money Laundering
Fraud: Understanding Fraud and Our Responsibilities
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection
Anti-money laundering presentation
Fraud principles1
7 Keys to Fraud Prevention, Detection and Reporting
Fraud in the Banking Sector
Fraud Detection presentation
Credit card fraud detection
Money laundering
Anti money laundering
Presentation on fraud prevention, detection & control
Ad

Similar to Final ppt (20)

PPTX
CYBERCRIME AND MONEY LAUNDERING
PPTX
Cyber crime ppt
PPSX
Cyber crimes (By Mohammad Ahmed)
PPTX
Cyber Crime
PPTX
Computer crime
DOC
Cyber crime
PDF
Cyberlaw and Cybercrime
PPSX
Unit 1
DOCX
127027205 selected-case-studies-on-cyber-crime
PPTX
Computer crime and internet crime privacy
PPT
Cyber Crime
PPTX
History of computer crime
DOCX
Cyber crime
PPTX
Cyber Crime and Security Presentation
PPT
Cyber crime & security final tapan
PPT
Cyber crime and forensic
TXT
Cyber crime
PPTX
Historical genesis and evolution of cyber crimes new
PPTX
Cyber crime
PPT
Introduction to CYBER-CRIME PRESENTATION.ppt
CYBERCRIME AND MONEY LAUNDERING
Cyber crime ppt
Cyber crimes (By Mohammad Ahmed)
Cyber Crime
Computer crime
Cyber crime
Cyberlaw and Cybercrime
Unit 1
127027205 selected-case-studies-on-cyber-crime
Computer crime and internet crime privacy
Cyber Crime
History of computer crime
Cyber crime
Cyber Crime and Security Presentation
Cyber crime & security final tapan
Cyber crime and forensic
Cyber crime
Historical genesis and evolution of cyber crimes new
Cyber crime
Introduction to CYBER-CRIME PRESENTATION.ppt

Recently uploaded (20)

DOCX
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
PPTX
A Clear View_ Interpreting Scope Numbers and Features
PPTX
Presentation 1.pptxnshshdhhdhdhdhdhhdhdhdhd
PPTX
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
DOCX
Copy-OT LIST 12.8.25.docxjdjfufufufufuuffuf
PDF
CAB UNIT 1 with computer details details
PPTX
Growth Capital Investment - Espresso Capital.pptx
PDF
Topic-1-Main-Features-of-Data-Processing.pdf
PPTX
Computers and mobile device: Evaluating options for home and work
PDF
ICT grade for 8. MATATAG curriculum .P2.pdf
PDF
Dozuki_Solution-hardware minimalization.
PDF
2_STM32&SecureElements2_STM32&SecureElements
PPTX
ELETRONIC-PRODUCTS-ASSEMBLY-AND-SERVICING-NC-II-WEEK-1-Copy.pptx
PPTX
RTS MASTER DECK_Household Convergence Scorecards. Use this file copy.pptx
PPTX
Prograce_Present.....ggation_Simple.pptx
PPTX
Unit-1.pptxgeyeuueueu7r7r7r77r7r7r7uriruru
PPTX
Subordinate_Clauses_BlueGradient_Optimized.pptx
PPTX
Grade 10 System Servicing for Hardware and Software
PDF
2- Physical Layer (06).pdfgshshshbsbshshshhs
PDF
Presented by ATHUL KRISHNA.S_20250813_191657_0000.pdf
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
A Clear View_ Interpreting Scope Numbers and Features
Presentation 1.pptxnshshdhhdhdhdhdhhdhdhdhd
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
Copy-OT LIST 12.8.25.docxjdjfufufufufuuffuf
CAB UNIT 1 with computer details details
Growth Capital Investment - Espresso Capital.pptx
Topic-1-Main-Features-of-Data-Processing.pdf
Computers and mobile device: Evaluating options for home and work
ICT grade for 8. MATATAG curriculum .P2.pdf
Dozuki_Solution-hardware minimalization.
2_STM32&SecureElements2_STM32&SecureElements
ELETRONIC-PRODUCTS-ASSEMBLY-AND-SERVICING-NC-II-WEEK-1-Copy.pptx
RTS MASTER DECK_Household Convergence Scorecards. Use this file copy.pptx
Prograce_Present.....ggation_Simple.pptx
Unit-1.pptxgeyeuueueu7r7r7r77r7r7r7uriruru
Subordinate_Clauses_BlueGradient_Optimized.pptx
Grade 10 System Servicing for Hardware and Software
2- Physical Layer (06).pdfgshshshbsbshshshhs
Presented by ATHUL KRISHNA.S_20250813_191657_0000.pdf

Final ppt

  • 1. CYBER CRIME AND MONEY LAUNDERING If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By
  • 3. The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet. INTERNET INTRODUCTION
  • 5. CONTENTS  Introduction.  History.  Cyber threat evolution.  Categories of cyber crime.  Types of cyber crime.
  • 6. INTRODUCTION Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 7. • The first recorded cyber crime took place in 1820. • In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. • The first spam email took place in 1976 when it was sent out over the ARPANET. • The first virus was installed on an Apple computer in 1982.
  • 9. We can categorize cyber crime in two ways. • The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. • The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 11. Hacking in simple terms means an illegal intrusion into a computer system or network. It is also known as CRACKING. Eg. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
  • 12. • Act by the criminal, who floods the bandwidth of the victims network. • Is his e-mail box with spam mail depriving him of the services.
  • 13. Malicious software that attaches itself to other software or computer system and then propagates itself to other computers via networks or disks. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc)
  • 14. • Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate .
  • 15. Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt. Ex. 26-11-2010
  • 16. Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 17. Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions requesting them to enter their Username Password or other personal information to access their Account for some reason.
  • 18. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles.
  • 20. CONTENTS  Introduction.  Stages.  Consequence.  Evasion.  Impact.
  • 21. WHAT IS MONEY LAUNDERING? Money laundering is the generic process used to describe the process by which criminals disguise the original ownership and control of the proceeds of criminal conduct by making such proceeds appeared to have arrived from legitimate sources.
  • 22. Stages Of Money Laundering Stage 1 Placement: Where criminally derived funds are introduced in the financial system Stage 2 Layering: Where property ownership and source of funds are disguised Stage 3 integration : Laundered property becomes legitimate
  • 23. Consequences Of Money Laundering • Increase In Crime And Corruption • Weak Financial Institutions •Loss Of National Reputation •Economical Harm And Detriment
  • 24. Evasion Of Tax And Money Laundering Tax evaders launder their money so they can lie about where the money and assets have come from
  • 25. Money laundering has a very negative impact on the Indian economy as well as the global economy in terms of loss of funds, reputation and global ranking. Impact Of Money Laundering
  • 26. CONCLUSION Each and every person uses internet and we feel we are safe enough to use it. We don’t have to put much effort for that. But criminal are there keeping eyes on your data. So Always Try To Be Safe And Secure!!! Reference :- www.google.com, Vipul Publication SY (A&F).