SlideShare a Scribd company logo
Infocrimeppt
 Introduction
 Definition
 Categories of Cyber crime
 Types of Cyber crime
 Safety tips
 Information Security
 Advantages
 Disadvantages
With the rapid technological developments, our life is
becoming more digitalized. Be it business, education,
shopping or banking transactions everything is on the
cyber space.
 There are some threats posed by this incredible rise
in digitization which is creating a new set of global
concern called as cyber crime.
DEFINITION:
Cyber crime refers to any crime that involves a
computer/mobile and a network.(INTERNET)
 Computer as a tool
 Computer as a target
 Computer as an instrumentality
 Crime associated with prevalence
of computers
 Hacking
 Identity theft
Virus Dissemination
Cyber Stalking
 Malicious software
 Logic Bombs
 Software piracy,etc.....
• Hacking in simple terms means an illegal intrusion
into a computer system or network.Also called as
cracking!
• This is a type of crime wherein a person’s computer
is broken into so that his personal or sensitive
information can be accessed.
• This has become a major problem with people using
the Internet for cash transactions and banking services.
• Malicious software that attaches itself to other
software. (Virus, worms, Trojan Horse , web-jacking,
email bombing etc)
Cyber Stalking refers to the use of the Internet, e-mail, or other
electronic communications devices to stalk another person.
•These are Internet-based software or programs that are
used to disrupt a network.
A logic bomb, also known as “slag code”, is a
malicious piece of code which is intentionally
inserted into software to execute a malicious task.
A Denial-of-Service (DoS) attack is an explicit attempt
by attackers to deny service to intended users of that
service.
Infocrimeppt
 This a technique of extracting confidential
information such as credit card numbers and
username password combos by masquerading as a
legitimate enterprise.
Software piracy is the unauthorized or illegal copying,
distribution, or use of software.
o Use Anti-virus software.
o Insert Firewalls.
o Uninstall unnecessary software
o Maintain Backup
o Check security settings
oNever give your full name or address to strangers.
o Learn more about Internet Privacy.
 Information security (infosec) is a set of strategies
for managing the processes, tools and policies
necessary to prevent, detect, document and counter
threats to digital and non-digital information.
 Easy to utilize.
 Keeps vital private information out of the
wrong hands.
 For the government it keeps top secret
information out of terrorist and enemy
nation's hands.
 Protects users valuable information both
while in use and while it is being stored
 Technology is always changing so users must
always purchase upgraded information security.
 Technology is always changing nothing will ever
be completely secure.
 If a user misses one single area that should be
protected the whole system could be
compromised.
 It can be extremely complicated and users might
not totally understand what they are dealing with.
 It can slow down productivity.

More Related Content

DOCX
Cyber crime
PPTX
Cyber security
PPTX
Cyber Security A Challenges For Mankind
PPTX
CYBER SECURITY
PPTX
Cyber security threats and trends
PPTX
Cyber Security
PPTX
Cyber crime and secuity
PPTX
Cyber Crime
Cyber crime
Cyber security
Cyber Security A Challenges For Mankind
CYBER SECURITY
Cyber security threats and trends
Cyber Security
Cyber crime and secuity
Cyber Crime

What's hot (20)

PPTX
Cyber security
PPTX
What is cyber security
PPTX
Cyber security 07
PPTX
Cyber security
PPTX
Cyber security ppt final
PPTX
Indian Cyber Army
PPTX
cyber security presentation.pptx
PPTX
Cyber crime
PPTX
Cyber Crime And Security
PPTX
Cyber security
PPTX
Cyber crime and cyber security
PPT
E secuity
PDF
Cyber security
PPTX
Cyber crime & security
PPTX
cyber security
PPTX
Cyber security
PPT
Computer Security
PPTX
CYBER SECURITY
PPTX
Cyber security ppt
PDF
Cyber Security & Information Warfare : A global security issue
Cyber security
What is cyber security
Cyber security 07
Cyber security
Cyber security ppt final
Indian Cyber Army
cyber security presentation.pptx
Cyber crime
Cyber Crime And Security
Cyber security
Cyber crime and cyber security
E secuity
Cyber security
Cyber crime & security
cyber security
Cyber security
Computer Security
CYBER SECURITY
Cyber security ppt
Cyber Security & Information Warfare : A global security issue
Ad

Similar to Infocrimeppt (20)

DOCX
Cyber Security.docx
PPTX
Cyber Security in detail PPT BY HIMANXU.pptx
PPTX
cyber security
PPTX
Information security
PDF
Cyber Ethics Notes.pdf
PPTX
Cyber crime & law
PDF
Implications of Misuse and Cyber Security.pdf
PPTX
Cybercrime
PPTX
ppt on securities.pptx
PPTX
The Importance OF Cybersecurity and trends
PPTX
Cyber crime and security
PDF
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
PDF
Guarding the Digital Fortress.pdf
PPTX
Computer security and
PPTX
cybersecurity and its importance in digital era
PPTX
Cyber Security
PDF
Cyber Security Threats | Cyberroot Risk Advisory
PPTX
cyber threats introduction and cyber threats types
PPTX
Cyber Security PPT.pptx
PPTX
Cyber-Security (1).pptx shhshsnsnsnsnsnsnsns
Cyber Security.docx
Cyber Security in detail PPT BY HIMANXU.pptx
cyber security
Information security
Cyber Ethics Notes.pdf
Cyber crime & law
Implications of Misuse and Cyber Security.pdf
Cybercrime
ppt on securities.pptx
The Importance OF Cybersecurity and trends
Cyber crime and security
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress.pdf
Computer security and
cybersecurity and its importance in digital era
Cyber Security
Cyber Security Threats | Cyberroot Risk Advisory
cyber threats introduction and cyber threats types
Cyber Security PPT.pptx
Cyber-Security (1).pptx shhshsnsnsnsnsnsnsns
Ad

Recently uploaded (20)

PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
Funds Management Learning Material for Beg
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PDF
simpleintnettestmetiaerl for the simple testint
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PPT
250152213-Excitation-SystemWERRT (1).ppt
PPT
Ethics in Information System - Management Information System
PPTX
E -tech empowerment technologies PowerPoint
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
artificialintelligenceai1-copy-210604123353.pptx
Funds Management Learning Material for Beg
Layers_of_the_Earth_Grade7.pptx class by
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
simpleintnettestmetiaerl for the simple testint
Introduction to cybersecurity and digital nettiquette
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Exploring VPS Hosting Trends for SMBs in 2025
250152213-Excitation-SystemWERRT (1).ppt
Ethics in Information System - Management Information System
E -tech empowerment technologies PowerPoint
Power Point - Lesson 3_2.pptx grad school presentation
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Mathew Digital SEO Checklist Guidlines 2025
SAP Ariba Sourcing PPT for learning material
newyork.pptxirantrafgshenepalchinachinane
Slides PPTX: World Game (s): Eco Economic Epochs.pptx

Infocrimeppt

  • 2.  Introduction  Definition  Categories of Cyber crime  Types of Cyber crime  Safety tips  Information Security  Advantages  Disadvantages
  • 3. With the rapid technological developments, our life is becoming more digitalized. Be it business, education, shopping or banking transactions everything is on the cyber space.  There are some threats posed by this incredible rise in digitization which is creating a new set of global concern called as cyber crime.
  • 4. DEFINITION: Cyber crime refers to any crime that involves a computer/mobile and a network.(INTERNET)
  • 5.  Computer as a tool  Computer as a target  Computer as an instrumentality  Crime associated with prevalence of computers
  • 6.  Hacking  Identity theft Virus Dissemination Cyber Stalking  Malicious software  Logic Bombs  Software piracy,etc.....
  • 7. • Hacking in simple terms means an illegal intrusion into a computer system or network.Also called as cracking! • This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed.
  • 8. • This has become a major problem with people using the Internet for cash transactions and banking services.
  • 9. • Malicious software that attaches itself to other software. (Virus, worms, Trojan Horse , web-jacking, email bombing etc)
  • 10. Cyber Stalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person.
  • 11. •These are Internet-based software or programs that are used to disrupt a network.
  • 12. A logic bomb, also known as “slag code”, is a malicious piece of code which is intentionally inserted into software to execute a malicious task.
  • 13. A Denial-of-Service (DoS) attack is an explicit attempt by attackers to deny service to intended users of that service.
  • 15.  This a technique of extracting confidential information such as credit card numbers and username password combos by masquerading as a legitimate enterprise.
  • 16. Software piracy is the unauthorized or illegal copying, distribution, or use of software.
  • 17. o Use Anti-virus software. o Insert Firewalls. o Uninstall unnecessary software o Maintain Backup o Check security settings oNever give your full name or address to strangers. o Learn more about Internet Privacy.
  • 18.  Information security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information.
  • 19.  Easy to utilize.  Keeps vital private information out of the wrong hands.  For the government it keeps top secret information out of terrorist and enemy nation's hands.  Protects users valuable information both while in use and while it is being stored
  • 20.  Technology is always changing so users must always purchase upgraded information security.  Technology is always changing nothing will ever be completely secure.  If a user misses one single area that should be protected the whole system could be compromised.  It can be extremely complicated and users might not totally understand what they are dealing with.  It can slow down productivity.