SlideShare a Scribd company logo
1 of 20
CYBER CRIMES
• Prepared By : P.RISHITH
13BCE0297
M.Sai Siddharth
13BCE0681
Introduction
• The usage of internet is growing rapidly.
• It has given new oppurtunities in every field we can think
of- be it entertainment,business,sports or education.
• Internet has its own advantages and disadvantages
• One of the major disadvantage is Cyber Crime
What is Cyber Crime?
• Use of Computer/Internet to something that
would be a crime in any case.
• It is an unlawful act where the computer is either a tool or a
target or both
• Acts that are punishable by Information Technology Act.
History
• In the early decades of modern information technology (IT), computer
crimes were largely committed by individual disgruntled and dishonest
employees.
• Physical damage to computer systems was a prominent threat until the
1980s.
• Programmers in the 1980s began writing malicious software, including self-
replicating programs, to interfere with personal computers.
• As the Internet increased access to increasing numbers of systems
worldwide, criminals used unauthorized access to poorly protected systems
for vandalism, political action and financial gain.
Categories of Cyber crime:
• Three categories-
• 1.Cyber crime against persons
• 2.Cyber crime against property
• 3.Cyber crime against government
First categorie:
• Includes various harassements such as
Sexual
Racial
Religious
Nationality etc
Any content that may be found derogatory or offensive is considered
harassment.
Second category
• These crimes include :
-Computer vandalism(destruction of others property)
-Transmission of harmful programs
-Unauthorised trespassing
-Unauthorised possession of computer information
Third Category
• Cyber terrorism is one distinct kind of crime in this
category.
• Cyber space is being used by individuals and groups to
threaten the organizations and international governments.
-Also to terrorize the citizens of a country.
Various Cyber Crimes :
• Unauthorised access to computer system or networks
• Theft of information contained in electronic form
• Data didling(manipulation of data)
• Hacking through various programmes
• Virus/worm attacks
• Trojan attacks
• Key loggers
• Malware(malicious code)
• Internet time thefts(gaining access to other internet
without his knowledge.
• Web jacking(forcefully taking control of the website)
• Theft of computer system
• Physically damaging a computer system
Hacking
• It has been noted that hackers have hacked millions of computers across the
globe and the number is increasing with every passing day.
• Some hackings are done just for fun others are done for stealing
information yet others are done for personal reasons such as taking revenge
from someone and so on.
• Stealing someone's personal data for own use, breaking through into a
company's account and making changes in their database
Cyber Criminals
• Australian nationwide survey conducted in 2006 found that two
in three convicted cyber-criminals were between the ages of 15
and 26
• Organised hackers
• Professional Hackers
• Discontended Employees
Questionnaire
• 1. Have you ever been the recipient of an e-mail you recognized as a scam?
• Yes: 81%
• No: 19%
• 2. Have you ever received a threatening or harassing e-mail? If yes, what did you do about it?
• Yes: 10%
• No: 90%
• 3. Have you ever been asked to meet in person with someone you only knew over the
Internet?
• Yes: 31%
• No: 69%
• 4. Have you ever been the victim of identity theft?
• Yes: 6%
• No: 94%
• 5. Do you know anyone who has been the victim of identity theft?
• Yes: 32%
• No: 68%
• 6. Have you ever had a computer virus that caused significant damage to
your computer or significant personal inconvenience?
• Yes: 78%
• No: 22%
• 7. Have you ever had personal information such as your social insurance number or
bank account numbers stolen through:
• Yes: 4%
• No: 96%
• 8. Have you ever received an e-mail soliciting child pornography?
• Yes: 7%
• No: 93%
• 9. Do you feel you know enough about how cybercrime is committed to do a
reasonable job protecting yourself?
• Yes: 45%
• No: 55%
Prevention
• Set a good firewall
• Disable and log off a specific user account to prevent access
• Disable specific applications for example , an e-mail system subjected
to a Spam attack
• Install intrusion prevention system
• Using various Anti virus , internet security , anti malware software’s
Thank you
Source:
• Britannica.com
• technocache.wordpress.com
• cybercrimeindia.org
• wikipedia

More Related Content

What's hot

Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber crime

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 

Similar to Cyber crime (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Cyber crime

  • 1. CYBER CRIMES • Prepared By : P.RISHITH 13BCE0297 M.Sai Siddharth 13BCE0681
  • 2. Introduction • The usage of internet is growing rapidly. • It has given new oppurtunities in every field we can think of- be it entertainment,business,sports or education. • Internet has its own advantages and disadvantages • One of the major disadvantage is Cyber Crime
  • 3. What is Cyber Crime? • Use of Computer/Internet to something that would be a crime in any case.
  • 4. • It is an unlawful act where the computer is either a tool or a target or both • Acts that are punishable by Information Technology Act.
  • 5. History • In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees. • Physical damage to computer systems was a prominent threat until the 1980s. • Programmers in the 1980s began writing malicious software, including self- replicating programs, to interfere with personal computers. • As the Internet increased access to increasing numbers of systems worldwide, criminals used unauthorized access to poorly protected systems for vandalism, political action and financial gain.
  • 6. Categories of Cyber crime: • Three categories- • 1.Cyber crime against persons • 2.Cyber crime against property • 3.Cyber crime against government
  • 7. First categorie: • Includes various harassements such as Sexual Racial Religious Nationality etc Any content that may be found derogatory or offensive is considered harassment.
  • 8. Second category • These crimes include : -Computer vandalism(destruction of others property) -Transmission of harmful programs -Unauthorised trespassing -Unauthorised possession of computer information
  • 9. Third Category • Cyber terrorism is one distinct kind of crime in this category. • Cyber space is being used by individuals and groups to threaten the organizations and international governments. -Also to terrorize the citizens of a country.
  • 10. Various Cyber Crimes : • Unauthorised access to computer system or networks • Theft of information contained in electronic form • Data didling(manipulation of data) • Hacking through various programmes • Virus/worm attacks • Trojan attacks • Key loggers
  • 11. • Malware(malicious code) • Internet time thefts(gaining access to other internet without his knowledge. • Web jacking(forcefully taking control of the website) • Theft of computer system • Physically damaging a computer system
  • 12. Hacking • It has been noted that hackers have hacked millions of computers across the globe and the number is increasing with every passing day. • Some hackings are done just for fun others are done for stealing information yet others are done for personal reasons such as taking revenge from someone and so on. • Stealing someone's personal data for own use, breaking through into a company's account and making changes in their database
  • 13.
  • 14.
  • 15. Cyber Criminals • Australian nationwide survey conducted in 2006 found that two in three convicted cyber-criminals were between the ages of 15 and 26 • Organised hackers • Professional Hackers • Discontended Employees
  • 16. Questionnaire • 1. Have you ever been the recipient of an e-mail you recognized as a scam? • Yes: 81% • No: 19% • 2. Have you ever received a threatening or harassing e-mail? If yes, what did you do about it? • Yes: 10% • No: 90% • 3. Have you ever been asked to meet in person with someone you only knew over the Internet? • Yes: 31% • No: 69%
  • 17. • 4. Have you ever been the victim of identity theft? • Yes: 6% • No: 94% • 5. Do you know anyone who has been the victim of identity theft? • Yes: 32% • No: 68% • 6. Have you ever had a computer virus that caused significant damage to your computer or significant personal inconvenience? • Yes: 78% • No: 22%
  • 18. • 7. Have you ever had personal information such as your social insurance number or bank account numbers stolen through: • Yes: 4% • No: 96% • 8. Have you ever received an e-mail soliciting child pornography? • Yes: 7% • No: 93% • 9. Do you feel you know enough about how cybercrime is committed to do a reasonable job protecting yourself? • Yes: 45% • No: 55%
  • 19. Prevention • Set a good firewall • Disable and log off a specific user account to prevent access • Disable specific applications for example , an e-mail system subjected to a Spam attack • Install intrusion prevention system • Using various Anti virus , internet security , anti malware software’s
  • 20. Thank you Source: • Britannica.com • technocache.wordpress.com • cybercrimeindia.org • wikipedia