SlideShare a Scribd company logo
CYBER CRIME
     Done by: Mohammed Tariq
CONTENT:

What is CYBERCRIME?
Forms of Cybercrime
Perpetrators of Cybercrime
Implications of Cybercrime
Conclusion
WHAT IS CYBERCRIME?
Cybercrime is defined as:

         computer-mediated activities which are either
illegal or considered illicit by certain parties and which
can be conducted through global electronic networks’
FORMS OF CYBERCRIME


Piracy – copying protected software without
authorisation
FORMS OF CYBERCRIME


Cracking – accessing computer systems without
authority to commit a crime.
FORMS OF CYBERCRIME

Phreaking – manipulating a phone system using
a computer or other device to obtain free telephone
calls or charge calls to another account
FORMS OF CYBERCRIME

Cyber stalking – using a computer to harass and
terrorise selected human and institutional targets,
causing them to fear injury or harm
FORMS OF CYBERCRIME

Cyber terrorism – unlawful attacks and threats
of attack by terrorists against computers, networks,
and the information stored therein to intimidate or
coerce a government or its people to further the
perpetrator’s political or social objectives
FORMS OF CYBERCRIME


Cyber pornography – producing and/or
distributing pornography using a computer
P E R P E T R AT O R S O F
             C Y B E RC R I M E

Hacker unions or crews (domestic and foreign)
Organised crime
Foreign Intelligence Services
Botnet operators
Random people
I M P L I C AT I O N S O F
               C Y B E RC R I M E

In 2008, security vendor AVG conducted a survey
into global cybercrime and found that Australia has
the highest incidence of cyber crime in the world
with more than 39 per cent of Australian’s having
been the victim of cyber crime
I M P L I C AT I O N S O F
               C Y B E RC R I M E


A recent report by the Australian Institute of
Criminology found that cybercrime is costing
Australian businesses more than $600 million
annually
CONCLUSION
 Cyber crime refers to illegal activities that take place online,
including fraud, spam, identity theft, computer viruses and
worms, cyber stalking, drug trafficking, sexual predators,
malware or spyware, phishing schemes and the like. Most
people become victims of these at one time or another.
REFERENCE LIST:

 http://www.ibls.com/internet_law_news_portal_view.aspx?id=16
46&s=latestnews

 http://www.computerworld.com.au/article/306743/cybercrime_c
osts_business_600m_report/

More Related Content

PPTX
Cybercrime in Nigeria - Technology and Society
PPSX
Cyber crime
PPTX
Cyber Crime
PPTX
Cyber crime(presentation) by Ahtasham Ali
PPT
PPTX
Introduction to cybercrime
PPTX
Cyber crime.pptx
PPT
Cyber crime
Cybercrime in Nigeria - Technology and Society
Cyber crime
Cyber Crime
Cyber crime(presentation) by Ahtasham Ali
Introduction to cybercrime
Cyber crime.pptx
Cyber crime

What's hot (20)

PPTX
Cyber crime
PPTX
Cyber crimes and its security
PPTX
Cybercrime.ppt
PPTX
Cyber Crime & Security
PPTX
cyber crime and security
PPTX
Cyber crime and security
PPTX
Digital safety
PPTX
Cybercrime and security
PPTX
Computer Vandalism
PPTX
It act and cyber crime
PPT
Cyber Crime and Security
PPTX
Cybercrime & Security
PPTX
cyber crime
PPTX
CyberCrimes
PPT
Cyber Crime
PPT
Cyber crime in the digital age
PPTX
Cyber Crime PPT
PPT
cyber crime and privacy issues by varun call for assistence 8003498888
PPTX
Cyber crime and security
PPTX
Cyber security , an Analysis of State Security in Sri Lanka
Cyber crime
Cyber crimes and its security
Cybercrime.ppt
Cyber Crime & Security
cyber crime and security
Cyber crime and security
Digital safety
Cybercrime and security
Computer Vandalism
It act and cyber crime
Cyber Crime and Security
Cybercrime & Security
cyber crime
CyberCrimes
Cyber Crime
Cyber crime in the digital age
Cyber Crime PPT
cyber crime and privacy issues by varun call for assistence 8003498888
Cyber crime and security
Cyber security , an Analysis of State Security in Sri Lanka
Ad

Similar to Mohammed tariq alsharhan (20)

PPTX
Cyber crime
PPTX
Cyber Crime
PPTX
PPTX
lecture notes Cyber-Crime and software Ergonomic
PPT
Mba seminar presentation
PPTX
Cyber Criminal and Cyber Security
PPTX
Cyber crime types & laws
PPTX
Cyber Secuirty Fully explained Lecture Notes
PPTX
Module 1.pptx
PPTX
Cybercrime
PDF
cybercrime investigation and digital forensics
PPTX
Cyber crime
PPTX
CLE-Cyber crimes.pptx
PPTX
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
PPTX
cyber crime & cyber law
PPTX
CYBER CRIME sujal education it related ppt. Pptx
PPTX
Cyber security for engg students and diploma
PPTX
cybersecurity subject chapter 1 lec 1-5.pptx
PPTX
Unit II.pptx
PPTX
Cybercrime
Cyber crime
Cyber Crime
lecture notes Cyber-Crime and software Ergonomic
Mba seminar presentation
Cyber Criminal and Cyber Security
Cyber crime types & laws
Cyber Secuirty Fully explained Lecture Notes
Module 1.pptx
Cybercrime
cybercrime investigation and digital forensics
Cyber crime
CLE-Cyber crimes.pptx
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
cyber crime & cyber law
CYBER CRIME sujal education it related ppt. Pptx
Cyber security for engg students and diploma
cybersecurity subject chapter 1 lec 1-5.pptx
Unit II.pptx
Cybercrime
Ad

More from Ahmed Sleem (8)

PPSX
Saeed mohamed saeed
PPSX
Khaled omar abdulla
PPSX
Hamdan mohammed al shehhi
PPSX
Sultan ahmed obaid
PPTX
Eisa eisa social networking
PPSX
Abdullah mohmmed habash
PPTX
Cyber bullying
PDF
Noura hasan thaiban
Saeed mohamed saeed
Khaled omar abdulla
Hamdan mohammed al shehhi
Sultan ahmed obaid
Eisa eisa social networking
Abdullah mohmmed habash
Cyber bullying
Noura hasan thaiban

Recently uploaded (20)

PPTX
Fundamental Principles of Visual Graphic Design.pptx
PPTX
areprosthodontics and orthodonticsa text.pptx
PPTX
AD Bungalow Case studies Sem 2.pptxvwewev
PDF
UNIT 1 Introduction fnfbbfhfhfbdhdbdto Java.pptx.pdf
PPTX
Implications Existing phase plan and its feasibility.pptx
PDF
Facade & Landscape Lighting Techniques and Trends.pptx.pdf
PPTX
building Planning Overview for step wise design.pptx
PPTX
Wisp Textiles: Where Comfort Meets Everyday Style
PPT
Machine printing techniques and plangi dyeing
PPTX
DOC-20250430-WA0014._20250714_235747_0000.pptx
PDF
BRANDBOOK-Presidential Award Scheme-Kenya-2023
PPT
unit 1 ppt.ppthhhhhhhhhhhhhhhhhhhhhhhhhh
PPT
Package Design Design Kit 20100009 PWM IC by Bee Technologies
PDF
Urban Design Final Project-Site Analysis
PPTX
Tenders & Contracts Works _ Services Afzal.pptx
PDF
Interior Structure and Construction A1 NGYANQI
PPTX
Special finishes, classification and types, explanation
PDF
SEVA- Fashion designing-Presentation.pdf
PPTX
mahatma gandhi bus terminal in india Case Study.pptx
PPTX
BSCS lesson 3.pptxnbbjbb mnbkjbkbbkbbkjb
Fundamental Principles of Visual Graphic Design.pptx
areprosthodontics and orthodonticsa text.pptx
AD Bungalow Case studies Sem 2.pptxvwewev
UNIT 1 Introduction fnfbbfhfhfbdhdbdto Java.pptx.pdf
Implications Existing phase plan and its feasibility.pptx
Facade & Landscape Lighting Techniques and Trends.pptx.pdf
building Planning Overview for step wise design.pptx
Wisp Textiles: Where Comfort Meets Everyday Style
Machine printing techniques and plangi dyeing
DOC-20250430-WA0014._20250714_235747_0000.pptx
BRANDBOOK-Presidential Award Scheme-Kenya-2023
unit 1 ppt.ppthhhhhhhhhhhhhhhhhhhhhhhhhh
Package Design Design Kit 20100009 PWM IC by Bee Technologies
Urban Design Final Project-Site Analysis
Tenders & Contracts Works _ Services Afzal.pptx
Interior Structure and Construction A1 NGYANQI
Special finishes, classification and types, explanation
SEVA- Fashion designing-Presentation.pdf
mahatma gandhi bus terminal in india Case Study.pptx
BSCS lesson 3.pptxnbbjbb mnbkjbkbbkbbkjb

Mohammed tariq alsharhan

  • 1. CYBER CRIME Done by: Mohammed Tariq
  • 2. CONTENT: What is CYBERCRIME? Forms of Cybercrime Perpetrators of Cybercrime Implications of Cybercrime Conclusion
  • 3. WHAT IS CYBERCRIME? Cybercrime is defined as: computer-mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through global electronic networks’
  • 4. FORMS OF CYBERCRIME Piracy – copying protected software without authorisation
  • 5. FORMS OF CYBERCRIME Cracking – accessing computer systems without authority to commit a crime.
  • 6. FORMS OF CYBERCRIME Phreaking – manipulating a phone system using a computer or other device to obtain free telephone calls or charge calls to another account
  • 7. FORMS OF CYBERCRIME Cyber stalking – using a computer to harass and terrorise selected human and institutional targets, causing them to fear injury or harm
  • 8. FORMS OF CYBERCRIME Cyber terrorism – unlawful attacks and threats of attack by terrorists against computers, networks, and the information stored therein to intimidate or coerce a government or its people to further the perpetrator’s political or social objectives
  • 9. FORMS OF CYBERCRIME Cyber pornography – producing and/or distributing pornography using a computer
  • 10. P E R P E T R AT O R S O F C Y B E RC R I M E Hacker unions or crews (domestic and foreign) Organised crime Foreign Intelligence Services Botnet operators Random people
  • 11. I M P L I C AT I O N S O F C Y B E RC R I M E In 2008, security vendor AVG conducted a survey into global cybercrime and found that Australia has the highest incidence of cyber crime in the world with more than 39 per cent of Australian’s having been the victim of cyber crime
  • 12. I M P L I C AT I O N S O F C Y B E RC R I M E A recent report by the Australian Institute of Criminology found that cybercrime is costing Australian businesses more than $600 million annually
  • 13. CONCLUSION  Cyber crime refers to illegal activities that take place online, including fraud, spam, identity theft, computer viruses and worms, cyber stalking, drug trafficking, sexual predators, malware or spyware, phishing schemes and the like. Most people become victims of these at one time or another.
  • 14. REFERENCE LIST:  http://www.ibls.com/internet_law_news_portal_view.aspx?id=16 46&s=latestnews  http://www.computerworld.com.au/article/306743/cybercrime_c osts_business_600m_report/