SlideShare a Scribd company logo
CYBER CRIME
CONTENT:
WHAT IS CYBER CRIME?
WHAT IS CYBER CRIME?
• Cybercrime is criminal activity that either targets or uses a computer, a computer network or a
networked device. Most cybercrime is committed by cybercriminals or hackers who want to
make money.
• However, occasionally cybercrime aims to damage computers or networks for reasons other
than profit. These could be political or personal.
• Cybercrime can be carried out by individuals or organizations. Some cybercriminals are
organized, use advanced techniques and are highly technically skilled. Others are novice
hackers.
• Cybercrime is incredibly organized and professionalized.
HISTORY
• The first recorded cybercrime was recorded in the year 1820.
• The first spam email took place in 1978 when it was sent over the Arpanet.
• The first virus was installed on an Apple computer in 1982.
WHO ARE THEY?
• Most cybercrimes are committed by individuals or small groups.
However, large organized crime groups also take advantage of the internet.
• These 'professional' criminals find new ways to commit old crimes, treating
cybercrime like a business and forming global criminal communities.
• Criminal communities share strategies and tools and can combine forces to
launch coordinated attacks.
• They even have underground market place where cyber criminals can buy
and sell stolen information and identities.
ATTACK TECHNIQUES:
• BOTNET- a network of software robots, or bots ,that automatically spread malware.
• ZOMBIE COMPUTER- a computer that has been hacked into and is used to launch malicious
arracks or to become part of a botnet.
• DENIAL OF SERVICE attackes -flooding a network or server with traffic in order to make it
unavailable to its users.
• SKIMMERS- Devices that steal credit card information when the card is swiped threw them.
This can happen in stores or restaurants when the card is out the owner's view and frequently
the credit card information is then sold online through a criminal community.
List of Cybercrimes:
• 1. Child Pornography OR Child sexually abusive material (CSAM)
• Child sexually abusive material (CSAM) refers to a material containing sexual images in any form, of a child who is
abused or sexually exploited. Section 67 (B) of the IT Act states that “it is punishable for publishing or transmitting of
material depicting children in the sexually explicit act, etc. in electronic form.
• 2. Cyber Bullying
• A form of harassment or bullying inflicted through the use of electronic or communication devices such as computers,
mobile phones, laptops, etc.
• 3. Cyber Stalking
• Cyberstalking is the use of electronic communication by a person to follow a person, or attempts to contact a person to
foster personal interaction repeatedly despite a clear indication of disinterest by such person; or monitors the internet,
email or any other form of electronic communication commits the offence of stalking.
• 4. Online Job Fraud
• Online Job Fraud is an attempt to defraud people who are in need of employment by giving them false hope/
promise of better employment with higher wages.
List of Cybercrimes:
• 5. Phishing
• Phishing is a type of fraud that involves stealing personal information such as Customer ID, IPIN, Credit/Debit Card
number, Card expiry date, CVV number, etc. through emails that appear to be from a legitimate source.
• 6. Vishing
• Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net Banking password, ATM
PIN, OTP, Card expiry date, CVV etc. through a phone call.
• 7. Smishing
• Smishing is a type of fraud that uses mobile phone text messages to lure victims into calling back on a fraudulent phone
number, visiting fraudulent websites or downloading malicious content via phone or web.
• 8. Data Breach
• A data breach is an incident in which information is accessed without authorization.
TYPES OF CYBER ATTACK BY PERCENTAGE
• Financial fraud: 11%
• Sabotage of data/networks: 17%
• Theft of proprietary information: 20%
• System penetration from the outside: 25%
• Denial of service: 27%
• Unauthorized access by insiders: 71%
• Employee abuse of internet privileges: 79%
• Viruses: 85%
How to protect yourself against cybercrime
1.Ensure your system is up-to-date
2.Use a secure internet connection
3.Use a strong password
4.Be aware of pop-ups and fraudulent emails
5.Protect yourself from identity threats
6.Manage your social media settings
7.Get right cyber insurance policy
8.Avoid the urge to save passwords in your browser
9.Do not trust everything on THE INTERNET
CONCLUSION
• Technology is destructive only in the hands of people who do not realize that they are one and
the same process as the universe.

More Related Content

PDF
Cyber Security U-1 ONE SHOT (NEW) Notes_c7ff765d-5cc7-4213-b668-842b59eb9ee5.pdf
PPTX
Cybercrime
PPTX
Cyber crime-140128140443-phpapp02 (1)
PPTX
cyber crime
PPT
Cyber Crime
PPTX
Cyber crime
PPTX
Cyber Crime And Security
PPT
CYBER CRIME AND SECURITY
Cyber Security U-1 ONE SHOT (NEW) Notes_c7ff765d-5cc7-4213-b668-842b59eb9ee5.pdf
Cybercrime
Cyber crime-140128140443-phpapp02 (1)
cyber crime
Cyber Crime
Cyber crime
Cyber Crime And Security
CYBER CRIME AND SECURITY

Similar to Presentation.pptx (20)

PPTX
introductiontocybercrimvvvvv63702-lva1-app6892.pptx
PPTX
Cybercrimes
PPTX
Cyber crime
PPTX
Cyber crime ands security.ppt
PPTX
Kinds of cybercrime (Social Networking for Social integration .pptx
PPTX
cyberCrime and other knowledge with ful detail
PPTX
Cyber security for engg students and diploma
PPTX
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
PPTX
Cyber Security Concepts, layers of security,
PPTX
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
PDF
Cyber Crime
PPTX
Cyber crime
PPTX
Cyber crime final round (3rd rank)
PPTX
PPTX
CYBER.pptx
PPTX
cybercrime.pptx
PPTX
Cybercrime
PPTX
Cyber Crime
PPTX
First Lecture- Cyber Security-Bangladesh.pptx
PPTX
Cyber Crime
introductiontocybercrimvvvvv63702-lva1-app6892.pptx
Cybercrimes
Cyber crime
Cyber crime ands security.ppt
Kinds of cybercrime (Social Networking for Social integration .pptx
cyberCrime and other knowledge with ful detail
Cyber security for engg students and diploma
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
Cyber Security Concepts, layers of security,
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
Cyber Crime
Cyber crime
Cyber crime final round (3rd rank)
CYBER.pptx
cybercrime.pptx
Cybercrime
Cyber Crime
First Lecture- Cyber Security-Bangladesh.pptx
Cyber Crime

More from Clichesin (7)

PPTX
01 Incoterms 2020.pptxdsgfhgjklkkjjhgfdsssdfg
PPTX
2. Various COO.pptx
PPTX
1 IEC REV220919.pptx
PPTX
IM PPT 2 ....pptx
PDF
polyethene-141204092607-conversion-gate01.pdf
PPTX
polyethene-1.pptx
PPTX
ABHI INTERSHIP REPORT.pptx
01 Incoterms 2020.pptxdsgfhgjklkkjjhgfdsssdfg
2. Various COO.pptx
1 IEC REV220919.pptx
IM PPT 2 ....pptx
polyethene-141204092607-conversion-gate01.pdf
polyethene-1.pptx
ABHI INTERSHIP REPORT.pptx

Recently uploaded (20)

PDF
Facade & Landscape Lighting Techniques and Trends.pptx.pdf
PPTX
LITERATURE CASE STUDY DESIGN SEMESTER 5.pptx
DOCX
The story of the first moon landing.docx
PPTX
Wisp Textiles: Where Comfort Meets Everyday Style
PPTX
building Planning Overview for step wise design.pptx
PPT
Machine printing techniques and plangi dyeing
PDF
Phone away, tabs closed: No multitasking
PPTX
Media And Information Literacy for Grade 12
PDF
YOW2022-BNE-MinimalViableArchitecture.pdf
PDF
Interior Structure and Construction A1 NGYANQI
PPTX
6- Architecture design complete (1).pptx
PPTX
areprosthodontics and orthodonticsa text.pptx
PPTX
BSCS lesson 3.pptxnbbjbb mnbkjbkbbkbbkjb
PPTX
YV PROFILE PROJECTS PROFILE PRES. DESIGN
PPTX
joggers park landscape assignment bandra
PDF
Skskkxiixijsjsnwkwkaksixindndndjdjdjsjjssk
PPT
UNIT I- Yarn, types, explanation, process
PPTX
Complete Guide to Microsoft PowerPoint 2019 – Features, Tools, and Tips"
PPTX
mahatma gandhi bus terminal in india Case Study.pptx
PPTX
DOC-20250430-WA0014._20250714_235747_0000.pptx
Facade & Landscape Lighting Techniques and Trends.pptx.pdf
LITERATURE CASE STUDY DESIGN SEMESTER 5.pptx
The story of the first moon landing.docx
Wisp Textiles: Where Comfort Meets Everyday Style
building Planning Overview for step wise design.pptx
Machine printing techniques and plangi dyeing
Phone away, tabs closed: No multitasking
Media And Information Literacy for Grade 12
YOW2022-BNE-MinimalViableArchitecture.pdf
Interior Structure and Construction A1 NGYANQI
6- Architecture design complete (1).pptx
areprosthodontics and orthodonticsa text.pptx
BSCS lesson 3.pptxnbbjbb mnbkjbkbbkbbkjb
YV PROFILE PROJECTS PROFILE PRES. DESIGN
joggers park landscape assignment bandra
Skskkxiixijsjsnwkwkaksixindndndjdjdjsjjssk
UNIT I- Yarn, types, explanation, process
Complete Guide to Microsoft PowerPoint 2019 – Features, Tools, and Tips"
mahatma gandhi bus terminal in india Case Study.pptx
DOC-20250430-WA0014._20250714_235747_0000.pptx

Presentation.pptx

  • 3. WHAT IS CYBER CRIME?
  • 4. WHAT IS CYBER CRIME? • Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. • However, occasionally cybercrime aims to damage computers or networks for reasons other than profit. These could be political or personal. • Cybercrime can be carried out by individuals or organizations. Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others are novice hackers. • Cybercrime is incredibly organized and professionalized.
  • 5. HISTORY • The first recorded cybercrime was recorded in the year 1820. • The first spam email took place in 1978 when it was sent over the Arpanet. • The first virus was installed on an Apple computer in 1982.
  • 6. WHO ARE THEY? • Most cybercrimes are committed by individuals or small groups. However, large organized crime groups also take advantage of the internet. • These 'professional' criminals find new ways to commit old crimes, treating cybercrime like a business and forming global criminal communities. • Criminal communities share strategies and tools and can combine forces to launch coordinated attacks. • They even have underground market place where cyber criminals can buy and sell stolen information and identities.
  • 7. ATTACK TECHNIQUES: • BOTNET- a network of software robots, or bots ,that automatically spread malware. • ZOMBIE COMPUTER- a computer that has been hacked into and is used to launch malicious arracks or to become part of a botnet. • DENIAL OF SERVICE attackes -flooding a network or server with traffic in order to make it unavailable to its users. • SKIMMERS- Devices that steal credit card information when the card is swiped threw them. This can happen in stores or restaurants when the card is out the owner's view and frequently the credit card information is then sold online through a criminal community.
  • 8. List of Cybercrimes: • 1. Child Pornography OR Child sexually abusive material (CSAM) • Child sexually abusive material (CSAM) refers to a material containing sexual images in any form, of a child who is abused or sexually exploited. Section 67 (B) of the IT Act states that “it is punishable for publishing or transmitting of material depicting children in the sexually explicit act, etc. in electronic form. • 2. Cyber Bullying • A form of harassment or bullying inflicted through the use of electronic or communication devices such as computers, mobile phones, laptops, etc. • 3. Cyber Stalking • Cyberstalking is the use of electronic communication by a person to follow a person, or attempts to contact a person to foster personal interaction repeatedly despite a clear indication of disinterest by such person; or monitors the internet, email or any other form of electronic communication commits the offence of stalking. • 4. Online Job Fraud • Online Job Fraud is an attempt to defraud people who are in need of employment by giving them false hope/ promise of better employment with higher wages.
  • 9. List of Cybercrimes: • 5. Phishing • Phishing is a type of fraud that involves stealing personal information such as Customer ID, IPIN, Credit/Debit Card number, Card expiry date, CVV number, etc. through emails that appear to be from a legitimate source. • 6. Vishing • Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call. • 7. Smishing • Smishing is a type of fraud that uses mobile phone text messages to lure victims into calling back on a fraudulent phone number, visiting fraudulent websites or downloading malicious content via phone or web. • 8. Data Breach • A data breach is an incident in which information is accessed without authorization.
  • 10. TYPES OF CYBER ATTACK BY PERCENTAGE • Financial fraud: 11% • Sabotage of data/networks: 17% • Theft of proprietary information: 20% • System penetration from the outside: 25% • Denial of service: 27% • Unauthorized access by insiders: 71% • Employee abuse of internet privileges: 79% • Viruses: 85%
  • 11. How to protect yourself against cybercrime 1.Ensure your system is up-to-date 2.Use a secure internet connection 3.Use a strong password 4.Be aware of pop-ups and fraudulent emails 5.Protect yourself from identity threats 6.Manage your social media settings 7.Get right cyber insurance policy 8.Avoid the urge to save passwords in your browser 9.Do not trust everything on THE INTERNET
  • 12. CONCLUSION • Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.