SlideShare a Scribd company logo
PRESENTATION BY: RISHABH MISHRA
B.TECH [CSE] 3RD YEAR
CYBER
CRIME
A Modern Threat
TOPICS
• CYBER CRIME
• TYPES OF CYBER CRIME
• CREDIT CARD FRAUDS
• HOW IS CYBER CRIME COMMITTED?
• DARKWEB
• HOW CAN AVOID WE CYBER
CRIME
• WEB 2.0
• WEB 3.0
• WORKING OF BLOCKCHAIN
Introduction
Cyber crime refers to criminal activities carried out using
computers, the internet, or other digital technologies.
TYPES
IDENTIY
TEFT
PHISHIN
G
MALWARE ATTACK
Identity theft is when someone steals your personal
information
and uses it to pretend to be you, often without your
permission
IDENTITY THEFT:-
rishabh cyber crime.pptx // presentation
A cyberattack that uses fraudulent messages to trick
people into sharing sensitive information, such as
passwords, credit card numbers, or bank information.
PHISHING:-
CREDIT CARD FRAUDS
a cyberattack that uses malicious software, or malware,
to
harm a computer, network, or server.
MALWARE:-
rishabh cyber crime.pptx // presentation
HOW IS CYBER
CRIME
COMMITTED?
DARK
WEB
TOR BROWSER DUCK DUCK GO .ONION
HEDDEN WIKE.XYZ
WORKING OF TOR BROWSER
TOR:-The Onion Router
HIDDEN
WIKI .ORG
HIDDEN
WIKI .XYZ
HIDDEN
WIKI .ORG
HIDDEN
WIKI .ORG
HOW CAN AVOID WE CYBER
CRIME
TYPE
S
EFECTIVE USE OF
WEB 2.0
EFECTIVE USE OF
WEB 3.0
CCEENNTTRR
AALLIIZZEED
DICENTRALIZED
1.Traditional Banking Systems.
2. Government Databases.
4. Cloud Storage Services (Google Drive, Dropbox).
5. Social Media Platforms (Facebook, Twitter).
6.Use ios and stock Android mobile phones like samsang ,pixel,
nothing phone.
7.Use always a good antivirus software like defender ,mc afee,norton,.
8.Always use a good bowser application like crome ,ms edge ,safari
,opera.
CENTRALIZE
D
DICENTRALIZED
SATOSHI NAKAMOTO
1.2007
2.FIRST BLOCKCHAIN DATABASE
3."BITCOIN: A PEER-TO-PEER
ELECTRONIC CASH SYSTEM“
WORKINGOF BLOCKCHAIN
LEDGER
DATA
DATA
HASH
H O P
DATA
DATA
HASH
H O P
DATA DATA
HASH
H OP
LADGER A LADGER B
LADGER C
LADGER C LADGER N
BLOCK CHAIN SYSTEM
GAVIN WOOD
• Ethereum
• Parity Technologies, a blockchain
infrastructure company.
• Web 3.0.
• Users own their data and the profits
from it.
• Applications are open source.
• All algorithms and software are
transparent.
JENSEN HUANG
Enhances the security and resilience of
blockchain networks.
Founder of NVIDIA
Crypto-minning
• Siri: Apple's AI assistant that allows users to control their devices and
surroundings with voice commands .
•Brave Browser: An open-source browser that uses blockchain
technology to protect privacy and connects users with Dapps, crypto
wallets, and other Web 3.0 technology .
•Everledger: A distributed digital registry that helps track valuable
assets.
•Storj: A decentralized storage solution that uses blockchain
technology .
•Sola: A decentralized social media platform that uses AI to
distribute
information .
•Metamask wallet
DICENTRALIZED
YO
U

More Related Content

PPTX
Cyber crime
PDF
NewsByte Mumbai October 2017
PPTX
News Bytes - December 2015
PPTX
Cybercrime
PPTX
Unit-3.pptx
PPTX
UNIT-3-Cybercrime Mobile and Wireless Devices-1.pptx
PPTX
Cyper crime
PPTX
Cyber crime
NewsByte Mumbai October 2017
News Bytes - December 2015
Cybercrime
Unit-3.pptx
UNIT-3-Cybercrime Mobile and Wireless Devices-1.pptx
Cyper crime

Similar to rishabh cyber crime.pptx // presentation (20)

PPT
CYBER CRIME AND SECURITY
PPTX
cyber threats and attacks.pptx
PPTX
cyber-crimghgirrif8eieifififejwjdjes.pptx
PPT
Cyber security 22-07-29=013
PPTX
Workshop on Cyber security
PDF
Protecting Your Business From Cybercrime
PPTX
Rishabhcyber security.pptx
PPTX
cybersecurity understanding in simple way
PPTX
Cyber crime and cyber security
PDF
How to Secure Your Mac Based Law Practice
PPTX
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
PPTX
Cybercrime a growing threat of 21 st century !!!
PPTX
dccn ppt-1.pptx
PPTX
Forensic And Cloud Computing
PDF
NCERT Ransomeware and malware attacks.pdf
PPTX
Cyber security
PDF
Ransomware ly
PDF
Hacker Tricks: How You Can Protect Yourself
PDF
Cyber espionage - Tinker, taylor, soldier, spy
PPTX
Cyber crime and security
CYBER CRIME AND SECURITY
cyber threats and attacks.pptx
cyber-crimghgirrif8eieifififejwjdjes.pptx
Cyber security 22-07-29=013
Workshop on Cyber security
Protecting Your Business From Cybercrime
Rishabhcyber security.pptx
cybersecurity understanding in simple way
Cyber crime and cyber security
How to Secure Your Mac Based Law Practice
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
Cybercrime a growing threat of 21 st century !!!
dccn ppt-1.pptx
Forensic And Cloud Computing
NCERT Ransomeware and malware attacks.pdf
Cyber security
Ransomware ly
Hacker Tricks: How You Can Protect Yourself
Cyber espionage - Tinker, taylor, soldier, spy
Cyber crime and security
Ad

Recently uploaded (20)

PPTX
1. Introduction to Computer Programming.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Modernising the Digital Integration Hub
PDF
STKI Israel Market Study 2025 version august
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
project resource management chapter-09.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Chapter 5: Probability Theory and Statistics
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Hybrid model detection and classification of lung cancer
1. Introduction to Computer Programming.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
Enhancing emotion recognition model for a student engagement use case through...
Modernising the Digital Integration Hub
STKI Israel Market Study 2025 version august
A contest of sentiment analysis: k-nearest neighbor versus neural network
observCloud-Native Containerability and monitoring.pptx
Tartificialntelligence_presentation.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Hindi spoken digit analysis for native and non-native speakers
project resource management chapter-09.pdf
A novel scalable deep ensemble learning framework for big data classification...
Assigned Numbers - 2025 - Bluetooth® Document
Chapter 5: Probability Theory and Statistics
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Programs and apps: productivity, graphics, security and other tools
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Hybrid model detection and classification of lung cancer
Ad

rishabh cyber crime.pptx // presentation

  • 1. PRESENTATION BY: RISHABH MISHRA B.TECH [CSE] 3RD YEAR CYBER CRIME A Modern Threat
  • 2. TOPICS • CYBER CRIME • TYPES OF CYBER CRIME • CREDIT CARD FRAUDS • HOW IS CYBER CRIME COMMITTED? • DARKWEB • HOW CAN AVOID WE CYBER CRIME • WEB 2.0 • WEB 3.0 • WORKING OF BLOCKCHAIN
  • 3. Introduction Cyber crime refers to criminal activities carried out using computers, the internet, or other digital technologies.
  • 5. Identity theft is when someone steals your personal information and uses it to pretend to be you, often without your permission IDENTITY THEFT:-
  • 7. A cyberattack that uses fraudulent messages to trick people into sharing sensitive information, such as passwords, credit card numbers, or bank information. PHISHING:-
  • 9. a cyberattack that uses malicious software, or malware, to harm a computer, network, or server. MALWARE:-
  • 13. TOR BROWSER DUCK DUCK GO .ONION HEDDEN WIKE.XYZ
  • 14. WORKING OF TOR BROWSER TOR:-The Onion Router
  • 19. HOW CAN AVOID WE CYBER CRIME TYPE S EFECTIVE USE OF WEB 2.0 EFECTIVE USE OF WEB 3.0 CCEENNTTRR AALLIIZZEED DICENTRALIZED
  • 20. 1.Traditional Banking Systems. 2. Government Databases. 4. Cloud Storage Services (Google Drive, Dropbox). 5. Social Media Platforms (Facebook, Twitter). 6.Use ios and stock Android mobile phones like samsang ,pixel, nothing phone. 7.Use always a good antivirus software like defender ,mc afee,norton,. 8.Always use a good bowser application like crome ,ms edge ,safari ,opera. CENTRALIZE D
  • 22. SATOSHI NAKAMOTO 1.2007 2.FIRST BLOCKCHAIN DATABASE 3."BITCOIN: A PEER-TO-PEER ELECTRONIC CASH SYSTEM“
  • 23. WORKINGOF BLOCKCHAIN LEDGER DATA DATA HASH H O P DATA DATA HASH H O P DATA DATA HASH H OP LADGER A LADGER B LADGER C LADGER C LADGER N BLOCK CHAIN SYSTEM
  • 24. GAVIN WOOD • Ethereum • Parity Technologies, a blockchain infrastructure company. • Web 3.0. • Users own their data and the profits from it. • Applications are open source. • All algorithms and software are transparent.
  • 25. JENSEN HUANG Enhances the security and resilience of blockchain networks. Founder of NVIDIA Crypto-minning
  • 26. • Siri: Apple's AI assistant that allows users to control their devices and surroundings with voice commands . •Brave Browser: An open-source browser that uses blockchain technology to protect privacy and connects users with Dapps, crypto wallets, and other Web 3.0 technology . •Everledger: A distributed digital registry that helps track valuable assets. •Storj: A decentralized storage solution that uses blockchain technology . •Sola: A decentralized social media platform that uses AI to distribute information . •Metamask wallet DICENTRALIZED
  • 27. YO U