SlideShare a Scribd company logo
The most critical and increasing
problem.
What is Cyber Crime?

      Crime committed using a computer
      and the internet to steal a person’s
      identity or illegal imports or
      malicious programs cybercrime is
      nothing but where the computer
      used as an object or subject of crime

      .
HISTORY:
The first recorded cyber crime took place in the
year 1820 That is not surprising considering the
fact that the abacus, which is thought to be the
earliest form of a computer, has been around since
3500 B.C.
My presentation
TYPES OF CYBER CRIME:
Hacking.
Denial   of service
Attacks.
IRC Crime
Credit Card Fraud
Phishing
Spoofing
Salami Attacks
Pornography
Net Extortion
Software Piracy
My presentation
HACKING:
Hacking in simple terms
means an illegal intrusion
into a computer system
and/or network. It is also
known as CRACKING.
Government websites are
the hot targets of the
hackers due to the press
coverage, it receives.
Hackers enjoy the media
coverage..
DENIAL OF SERVICE
        ATTACKS:
This is an act by the
criminal, who floods
the band width of
the victim’s network
or fills his e-mail box
with spam mail
depriving him of the
services he is entitled
to access or provide.
My presentation
IRC (INTERNET RELAY
CHAT):

Internet Relay Chat (IRC) servers have chat rooms in
which people from anywhere the world can come together
and chat with each other .Criminals use it for meeting
coconspirators. Hackers use it for discussing their exploits
/ sharing the techniques
Pedophiles use chat rooms to allure small children.
CREDIT CARD FRAUD:
           You simply have to type
           credit card number into
           www page off the vendor
           for online transaction If
           electronic transactions
           are not secured the credit
           card numbers can be
           stolen by the hackers who
           can misuse this card by
           impersonating the credit
           card owner.
My presentation
PHISHING:
Phishing    is the act of attempting to acquire information
such as usernames, passwords, and credit card details
(and sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic communication.
Communications purporting to be from popular social web
sites, auction sites, online payment processors or IT
administrators are commonly used to lure the
unsuspecting public. Phishing emails may contain links to
websites that are infected with malware. Phishing is
typically carried out by e-mail spoofing or instant
messaging, and it often directs users to enter details at a
fake website whose look and feel are almost identical to
the legitimate one.
SOFTWARE PIRACY:
           Theft of software through the
           illegal copying of genuine
           programs or the counterfeiting
           and distribution of products
           intended to pass for the
           original. Retail revenue losses
           world wide are ever
           increasing due to this crime
           Can be done in various ways
           such as end user copying, hard
           disk
           loading, Counterfeiting, Illega
           l downloads from the internet
           etc
PORNOGRAPHY:
          Pornography is the first
          consistently successful ecommerce
          product. It was a
          deceptive marketing tactics and
          mouse trapping technologies.
          Pornography encourage
          customers to access their
          websites. Anybody including
          children can log on to the
          internet and access website with
          pornography contents with a
          click of a mouse.
VIRUS:
In computers, a virus is a program or programming code that
replicates by being copied or initiating its copying to another
program, computer boot sector or document. Viruses can be
transmitted as attachments to an e-mail note or in a downloaded
file, or be present on a diskette or CD. The immediate source of the
e-mail note, downloaded file, or diskette you've received is usually
unaware that it contains a virus. Some viruses wreak their effect
as soon as their code is executed; other viruses lie dormant until
circumstances cause their code to be executed by the computer.
(virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit
and Bacterium are the malicious softwares)
My presentation
THEREFORE THERE ARE
MANY CRIMES WHICH ARE
DONE THROUGH INTERNET.
PRECAUTION TO STOP
 CYBER CRIMES:
Update   your virus
protection software often
at least once a week.
Change your password
frequently and never
give them out to
anyone! Use password
that are at least 6
characters and do not
contain words in the
Back Up your files very
regularly.
Don’t open suspicious
attachments. Always look at
the three letter file extension.
Don’t leave your
computer unattended
after logging in (And
always log out when
you are finished).
Devashri Balinge.
Priyanka Deshpande.

                      Presented
                      By:
THANK YOU!
QUESTIONS:

More Related Content

PDF
PPTX
Seminar
PPTX
Cyber crime introduction awareness program at st. xavier
PDF
Cybersecurity Awareness Infographics
PPTX
PDF
Phishing
PPTX
Disadvantages of-i ct-woww
PPTX
Cyber crimes
Seminar
Cyber crime introduction awareness program at st. xavier
Cybersecurity Awareness Infographics
Phishing
Disadvantages of-i ct-woww
Cyber crimes

What's hot (19)

PPT
Cybercrime 1
PPTX
PPT
Internet threats and defence mechanism
 
PDF
Phishing exposed
PPTX
Cyber Crime and Social Media Security
PPTX
Computer crimes(1)
PPTX
secure from Phishing Hacking and Keylogger
PDF
Compilation of phishing and keylogger attacks
PPTX
Cybercrimes
PPTX
High Tech (Cyber) Crimes
PDF
Internet Safety Glossary of Terms
PPTX
Cyber crime
PPTX
Online safety, security, and ethics
PDF
Cyber Security | Patricia Watson
PPTX
Internet security
PDF
Security Primer
PDF
CDSE Cybsecurity Awareness Posters
PPTX
Cybercrimes
Cybercrime 1
Internet threats and defence mechanism
 
Phishing exposed
Cyber Crime and Social Media Security
Computer crimes(1)
secure from Phishing Hacking and Keylogger
Compilation of phishing and keylogger attacks
Cybercrimes
High Tech (Cyber) Crimes
Internet Safety Glossary of Terms
Cyber crime
Online safety, security, and ethics
Cyber Security | Patricia Watson
Internet security
Security Primer
CDSE Cybsecurity Awareness Posters
Cybercrimes
Ad

Similar to My presentation (20)

PPSX
Cyber crimes (By Mohammad Ahmed)
PPTX
Cyber crimes
PPTX
Cyber crime
PPTX
Computer crime and internet crime privacy
DOCX
Cyber crime in pakistan by zubair
PPTX
Legal (Types of Cyber Crime)
PDF
Ch 1 intro to cyber crime and cyber security.pdf
PPTX
Cybercrime
PPTX
Cyber crime and cyber security
PPTX
Cyber crimes
PPTX
Cyber crime
DOC
Cape it unit 2 module 3 unedited students notes (compiled from internet)
DOCX
Cyber crime
PPT
Cyber crime and cyber security
DOCX
PPTX
Computer Crime
PPTX
CYBER CRIME - A Threat To Internet Users
PDF
Cyber Security
PPTX
Cybercrime 111205224958-phpapp02
PPSX
Cyber crime
Cyber crimes (By Mohammad Ahmed)
Cyber crimes
Cyber crime
Computer crime and internet crime privacy
Cyber crime in pakistan by zubair
Legal (Types of Cyber Crime)
Ch 1 intro to cyber crime and cyber security.pdf
Cybercrime
Cyber crime and cyber security
Cyber crimes
Cyber crime
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cyber crime
Cyber crime and cyber security
Computer Crime
CYBER CRIME - A Threat To Internet Users
Cyber Security
Cybercrime 111205224958-phpapp02
Cyber crime
Ad

My presentation

  • 1. The most critical and increasing problem.
  • 2. What is Cyber Crime? Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where the computer used as an object or subject of crime .
  • 3. HISTORY: The first recorded cyber crime took place in the year 1820 That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C.
  • 5. TYPES OF CYBER CRIME: Hacking. Denial of service Attacks. IRC Crime Credit Card Fraud Phishing Spoofing Salami Attacks Pornography Net Extortion Software Piracy
  • 7. HACKING: Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage..
  • 8. DENIAL OF SERVICE ATTACKS: This is an act by the criminal, who floods the band width of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
  • 10. IRC (INTERNET RELAY CHAT): Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other .Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits / sharing the techniques Pedophiles use chat rooms to allure small children.
  • 11. CREDIT CARD FRAUD: You simply have to type credit card number into www page off the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
  • 13. PHISHING: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
  • 14. SOFTWARE PIRACY: Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crime Can be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illega l downloads from the internet etc
  • 15. PORNOGRAPHY: Pornography is the first consistently successful ecommerce product. It was a deceptive marketing tactics and mouse trapping technologies. Pornography encourage customers to access their websites. Anybody including children can log on to the internet and access website with pornography contents with a click of a mouse.
  • 16. VIRUS: In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares)
  • 18. THEREFORE THERE ARE MANY CRIMES WHICH ARE DONE THROUGH INTERNET.
  • 19. PRECAUTION TO STOP CYBER CRIMES: Update your virus protection software often at least once a week. Change your password frequently and never give them out to anyone! Use password that are at least 6 characters and do not contain words in the
  • 20. Back Up your files very regularly. Don’t open suspicious attachments. Always look at the three letter file extension. Don’t leave your computer unattended after logging in (And always log out when you are finished).