SlideShare a Scribd company logo
2
Most read
5
Most read
8
Most read
A PRESENTATION ON CYBER
CRIME
PREPARED BY:-
Devanshi Solanki
Om Patel
content
 What is Cyber Crime?
 Types of Cyber Crime.
 Classification of Cyber Crime.
 How to solve cyber crime?
What is Cyber crime?
■ Cyber crime is simply defined as crimes that are directly related
to computer using computer.
■ An increasing number of domestic and international criminal
activities are using the INTERNET.
■ Computers and other electronic devices are tools for criminal to
commit crime.
■ A personal computer connected to the internet without protection
may be infected with cyber crime in one minute.
■ Cyber Crime is one of the fastest growing criminal activities on the
planet.
■ It covers a huge range of illegal activity including financial scams ,
computer hacking ,virus attacks and stalking by e-mail .
■ Cyber Crime has been used to describe wide range of crimes ,
including crimes against computer data and systems(such as
“Hacking”) , computer related forgery and fraud(such as “Phishing”)
etc.
TYPES OF CYBER CRIME
Types of cyber crime
Against Individuals
Against Individual
property
Against an
organization
Against
Government
 Terrorize
international
Govt.
 Cracking
into Military
maintained
website.
 Intellectual
Property
crime.
 Transmitting
Virus.
 Computer
vandalism.
 Cyber
terrorism
against the
government
organization.
 Possession
of
unauthorized
information.
 Email
Spoofing.
 Cheating &
fraud.
CLASSIFICATION OF CYBER CRIME
■ Cyber crimes are crime related to information technology, electronic,
commerce etc. Cyber crimes are increasing in all countries and they are
bound to explode new legal issues.
■ There are a variety of crimes committed on the Internet but some of them
are:
1) Internet Fraud and financial crimes.
2) Spam E-mail.
3) Online Gambling
4) Phishing.
5) Hacking.
Internet Fraud and financial crimes
Money is the most common motive behind
all crime.
 Various Internet frauds include online auctions,
Internet access devices , travel/vacations, advance
fee loan, prizes etc. Payment method varies from
credit/debit card to cheque to even sending cash.
 Financial crimes Include cyber cheating, credit
card frauds, money laundering, hacking into bank
servers, computer manipulation, accounting
scams etc.
Phishing
 Phishing is a new kind of cybercrime and
method of committing online financial fraud.
 It tricks computer users into entering critical
and sensitive information in fake websites,
which is later used by them for identity theft
and swindling user bank accounts.
 The term "phishing" is derived from "fishing“
where bait is offered to fish
ONLINE GAMBLING
 Online gambling is any kind of gambling
conducted on the internet. This includes
virtual poker, casinos and sports betting.
 Online gambling involves huge volumes
of transactions and cash flows that can
obscure and disguise money laundering.
 Players are not dealing with a physical
currency does not change hands
 As a result, illegal proceeds can be lorded
by criminal and end of transaction and
receiving the payouts as gambling wins on
the other end.
Hacking
■ A hacker is someone who likes to tinker with electronic or
computer systems: finding ways to make them do what
they do better, or do things they weren’t intended to do.
■ Hackers are always everywhere ,nothing is secured these
days.
■ Cyber attacks are an attempt to destroy or infect computer
networks in order to extract or extort money or for other
malicious intentions such as procuring necessary
information.
■ Cyber attacks alter computer code, data or logic via
malicious code resulting in troublesome
SPAM E-MAIL
 Email spam is the electronic version
of junk mail.
 It involves sending unwanted
messages, often unsolicited
advertising to a large number of
recipients.
 Spam is a serious security concern
as it can used to deliver Trojan
horses , viruses , worms , spyware
and targeted phishing attacks.
HOW TO SOLVE CYBER CRIME?
■ Use a full-service internet security suite.
■ Use strong Password.
■ Kee your software upgrade.
■ Manage your social media settings.
■ Talk to your children about the internet.
■ Secure your wireless networks.
■ Practice safe shopping.
■ Practice safe surfing.
■ Uninstall unnecessary software.
■ Maintain Backup.
■ Learn more about Internet privacy.
THANK YOU

More Related Content

PPTX
Introduction to cybercrime
PPTX
Cyber Crime and Social Media Security
PPTX
Cyber Crime
PPTX
Cyber Crime
PPT
Cyberstalking
PPTX
Cyber crime and Security
PPTX
Cyber crime
PPTX
Cyber crime ppt
Introduction to cybercrime
Cyber Crime and Social Media Security
Cyber Crime
Cyber Crime
Cyberstalking
Cyber crime and Security
Cyber crime
Cyber crime ppt

What's hot (20)

PPTX
Cyber crime - What is and types.
PPTX
Cyber Crime
PPSX
Cyber Laws
PPT
Cyber defamation
PPTX
Computer Vandalism
PPTX
Cyber crime-140128140443-phpapp02 (1)
PPTX
Cyber crime and its types
PPTX
Cyber law In India: its need & importance
PPTX
cyber crime
PPTX
Cyber crime
PPTX
Cyber security and cyber laws
PPT
PPTX
Cyber Crime
PPTX
Introduction to Cyber Crimes
PPTX
Computer crime
PPTX
Cyber crime
PPT
Cyber Crime & Security
PPTX
Cyber crime
PDF
Cyber Crime
PPTX
Cyber crime in india
Cyber crime - What is and types.
Cyber Crime
Cyber Laws
Cyber defamation
Computer Vandalism
Cyber crime-140128140443-phpapp02 (1)
Cyber crime and its types
Cyber law In India: its need & importance
cyber crime
Cyber crime
Cyber security and cyber laws
Cyber Crime
Introduction to Cyber Crimes
Computer crime
Cyber crime
Cyber Crime & Security
Cyber crime
Cyber Crime
Cyber crime in india
Ad

Similar to Presentation on cyber crime (20)

PPTX
Cyber Crime And Security
PPTX
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
PPTX
Cyber crime and security
PPTX
PPTX
Cyber crime
PDF
cybercrimeandtypes-19101817340 2.pdf
PPTX
Cybercrime
PPTX
Cybercrime
PPTX
Cyber crime
PPTX
Cyber crime and security
PPTX
CLE-Cyber crimes.pptx
PPTX
Typology of Cyber Crime
PDF
Cyber crime-A burning issue of today's world
PPTX
Cybercrime
PPTX
Cybercrime
PPTX
Cybercrime
PPTX
Cybercrime
PDF
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
PPTX
Cybercrime 111205224958-phpapp02
PPTX
cybercrime.pptx
Cyber Crime And Security
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
Cyber crime and security
Cyber crime
cybercrimeandtypes-19101817340 2.pdf
Cybercrime
Cybercrime
Cyber crime
Cyber crime and security
CLE-Cyber crimes.pptx
Typology of Cyber Crime
Cyber crime-A burning issue of today's world
Cybercrime
Cybercrime
Cybercrime
Cybercrime
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cybercrime 111205224958-phpapp02
cybercrime.pptx
Ad

Recently uploaded (20)

DOCX
Get More Leads From LinkedIn Ads Today .docx
PDF
Presentation-Popular-Culture-in-the-Philippines.pdf
PPTX
Mindfulness_and_Coping_Workshop in workplace
PDF
DIGITAL MARKETING CONTENTS INCLUDING DEFINTIONS AND IMPORTANTS
PPTX
Social Media Optimization Services to Grow Your Brand Online
PDF
The Effect of Internships on Career Preparedness as Perceived by Criminology ...
PDF
Faculty of E languageTruongMinhThien.pdf
PDF
Regulation Study, Differences and Implementation of Bank Indonesia National C...
PDF
Implementation of Total Quality Management (TQM) in Plywood Production Contro...
PPTX
Eric Starker - Social Media Portfolio - 2025
PDF
Why AI-Savvy Freelance Digital Marketers Have a Competitive Edge!.pdf
PDF
Optimizing Customer Lifetime Value (CLV) Prediction Models in Retail Banking ...
PDF
49f97d4d-be4b-40d1-88f7-06f1460c2238.pdf
PPTX
Smart Card Face Mask detection soluiondr
PDF
Does Ownership Structure Play an Important Role in the Banking Industry?
PPTX
How to Make Sure Your Video is Optimized for SEO
DOC
ASU毕业证学历认证,圣三一拉邦音乐与舞蹈学院毕业证留学本科毕业证
PDF
Social Media Marketing Company In Nagpur
PDF
Online echo chambers, misinformation, disinformation, identity politics, how ...
PDF
The Effect of Compensation and Work Environment on Employee Performance with ...
Get More Leads From LinkedIn Ads Today .docx
Presentation-Popular-Culture-in-the-Philippines.pdf
Mindfulness_and_Coping_Workshop in workplace
DIGITAL MARKETING CONTENTS INCLUDING DEFINTIONS AND IMPORTANTS
Social Media Optimization Services to Grow Your Brand Online
The Effect of Internships on Career Preparedness as Perceived by Criminology ...
Faculty of E languageTruongMinhThien.pdf
Regulation Study, Differences and Implementation of Bank Indonesia National C...
Implementation of Total Quality Management (TQM) in Plywood Production Contro...
Eric Starker - Social Media Portfolio - 2025
Why AI-Savvy Freelance Digital Marketers Have a Competitive Edge!.pdf
Optimizing Customer Lifetime Value (CLV) Prediction Models in Retail Banking ...
49f97d4d-be4b-40d1-88f7-06f1460c2238.pdf
Smart Card Face Mask detection soluiondr
Does Ownership Structure Play an Important Role in the Banking Industry?
How to Make Sure Your Video is Optimized for SEO
ASU毕业证学历认证,圣三一拉邦音乐与舞蹈学院毕业证留学本科毕业证
Social Media Marketing Company In Nagpur
Online echo chambers, misinformation, disinformation, identity politics, how ...
The Effect of Compensation and Work Environment on Employee Performance with ...

Presentation on cyber crime

  • 1. A PRESENTATION ON CYBER CRIME PREPARED BY:- Devanshi Solanki Om Patel
  • 2. content  What is Cyber Crime?  Types of Cyber Crime.  Classification of Cyber Crime.  How to solve cyber crime?
  • 3. What is Cyber crime? ■ Cyber crime is simply defined as crimes that are directly related to computer using computer. ■ An increasing number of domestic and international criminal activities are using the INTERNET. ■ Computers and other electronic devices are tools for criminal to commit crime.
  • 4. ■ A personal computer connected to the internet without protection may be infected with cyber crime in one minute. ■ Cyber Crime is one of the fastest growing criminal activities on the planet. ■ It covers a huge range of illegal activity including financial scams , computer hacking ,virus attacks and stalking by e-mail . ■ Cyber Crime has been used to describe wide range of crimes , including crimes against computer data and systems(such as “Hacking”) , computer related forgery and fraud(such as “Phishing”) etc.
  • 5. TYPES OF CYBER CRIME Types of cyber crime Against Individuals Against Individual property Against an organization Against Government  Terrorize international Govt.  Cracking into Military maintained website.  Intellectual Property crime.  Transmitting Virus.  Computer vandalism.  Cyber terrorism against the government organization.  Possession of unauthorized information.  Email Spoofing.  Cheating & fraud.
  • 6. CLASSIFICATION OF CYBER CRIME ■ Cyber crimes are crime related to information technology, electronic, commerce etc. Cyber crimes are increasing in all countries and they are bound to explode new legal issues. ■ There are a variety of crimes committed on the Internet but some of them are: 1) Internet Fraud and financial crimes. 2) Spam E-mail. 3) Online Gambling 4) Phishing. 5) Hacking.
  • 7. Internet Fraud and financial crimes Money is the most common motive behind all crime.  Various Internet frauds include online auctions, Internet access devices , travel/vacations, advance fee loan, prizes etc. Payment method varies from credit/debit card to cheque to even sending cash.  Financial crimes Include cyber cheating, credit card frauds, money laundering, hacking into bank servers, computer manipulation, accounting scams etc.
  • 8. Phishing  Phishing is a new kind of cybercrime and method of committing online financial fraud.  It tricks computer users into entering critical and sensitive information in fake websites, which is later used by them for identity theft and swindling user bank accounts.  The term "phishing" is derived from "fishing“ where bait is offered to fish
  • 9. ONLINE GAMBLING  Online gambling is any kind of gambling conducted on the internet. This includes virtual poker, casinos and sports betting.  Online gambling involves huge volumes of transactions and cash flows that can obscure and disguise money laundering.  Players are not dealing with a physical currency does not change hands  As a result, illegal proceeds can be lorded by criminal and end of transaction and receiving the payouts as gambling wins on the other end.
  • 10. Hacking ■ A hacker is someone who likes to tinker with electronic or computer systems: finding ways to make them do what they do better, or do things they weren’t intended to do. ■ Hackers are always everywhere ,nothing is secured these days. ■ Cyber attacks are an attempt to destroy or infect computer networks in order to extract or extort money or for other malicious intentions such as procuring necessary information. ■ Cyber attacks alter computer code, data or logic via malicious code resulting in troublesome
  • 11. SPAM E-MAIL  Email spam is the electronic version of junk mail.  It involves sending unwanted messages, often unsolicited advertising to a large number of recipients.  Spam is a serious security concern as it can used to deliver Trojan horses , viruses , worms , spyware and targeted phishing attacks.
  • 12. HOW TO SOLVE CYBER CRIME? ■ Use a full-service internet security suite. ■ Use strong Password. ■ Kee your software upgrade. ■ Manage your social media settings. ■ Talk to your children about the internet. ■ Secure your wireless networks. ■ Practice safe shopping. ■ Practice safe surfing. ■ Uninstall unnecessary software. ■ Maintain Backup. ■ Learn more about Internet privacy.