SlideShare uma empresa Scribd logo
1 de 16
RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME

1
RAJENDRA DANGWAL
RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME B.TECH- IT

2
RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME

3
 Cybercrime is nothing but where the computer used as an
object or subject of crime.

Cyber crime is an evil having its origin in the growing
dependence on computers in modern life. In a day and
age when everything from microwave ovens and
refrigerators to nuclear power plants is being run on
computers, cyber crime has assumed rather sinister
implications.
 Crime committed using a computer and the internet to steal a
person's identity or illegal imports or malicious programs.
RAJENDRA
DANGWAL,
CYBER CRIME

GEHU(BHIMTAL)
4
 In the early decades of modern information technology (IT),
computer crimes were largely committed by individual disgruntled
and dishonest employees.
 Physical damage to computer systems was a prominent threat
until the 1980s.

 Programmers in the 1980s began writing malicious software,
including self-replicating programs, to interfere with personal
computers.
 As the Internet increased access to increasing numbers of
systems worldwide, criminals used unauthorized access to poorly
protected systems for vandalism, political action and financial
gain.
RAJENDRA
DANGWAL,
CYBER CRIME

GEHU(BHIMTAL)
5
Criminal activity involving
 Information technology
infrastructure
 Illegal access
 Data interference
 Misuse of devices
 Forgery and
 Electronic fraud.
RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME

6
Types of Cyber Crime
Hacking - Hacking in simple terms means an illegal intrusion into a
computer system without permission of computer owner/user. Hackers
write or use ready-made computer programs to attack the target
computer.
Software Piracy - Theft of software through the illegal copying of
genuine programs or the counterfeiting
and
distribution
of
products intended to pass for the original. The unauthorized copying
of software.

RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME

7
Email spoofing - A spoofed email is one that appears to originate from
one source but actually has been sent from another source.

Phishing - The e-mail directs the user to visit a Web site where they are
asked to update personal information, such as passwords and credit card,
social security, and bank account numbers, that the legitimate
organization already has .

RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME

8
CLASSIFICATION

 Against Individuals
 Against Organization
 Against Society

RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME

9
 Harassment via e-mails
 Email spoofing
 Defamation. Unauthorized control/access
over computer system
 Cheating & Fraud
 Phishing

RAJENDRA
DANGWAL,
CYBER CRIME

GEHU(BHIMTAL)
10
Unauthorized

control/access over computer

system.
Possession

of unauthorized information.

Cyber

terrorism against the government
organization.
Distribution

of pirated software etc.

RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME

11
 Polluting the youth
through indecent exposure.
 Trafficking
 Financial crimes
 Sale of illegal articles
 Online gambling
 Forgery
RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME

12
RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME

13
PREVENTION OF CYBER CRIME
 Anti-virus software .

 Frequent password changing.
 Firewalls.
 Safe surfing.
 Frequent virus checks.
 Email filters.

RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME

14
 User awareness is key to a secure computer/network
 Do not open suspicious files/emails
 Avoid using P2P programs
 Avoid downloading freeware
 If attacked, disconnect the network. Do not turn off the
computer
 So we must pay attention to all those issues and protect the
World from Cyber Crime
 “If you spend more on coffee than on IT security, you
will be hacked. What’s more, you deserve to be hacked.
— White House Cybersecurity Advisor” ─ Richard
Clarke
RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME

15
RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME

16

Mais conteúdo relacionado

Mais procurados (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 

Destaque

Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Introduction to Cybercrime & Cyberlaw
Introduction to Cybercrime & CyberlawIntroduction to Cybercrime & Cyberlaw
Introduction to Cybercrime & CyberlawAhmad Fauzi
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destaque (10)

Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Introduction to Cybercrime & Cyberlaw
Introduction to Cybercrime & CyberlawIntroduction to Cybercrime & Cyberlaw
Introduction to Cybercrime & Cyberlaw
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Semelhante a Cyber crime

A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfKira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02raja jawahar
 

Semelhante a Cyber crime (20)

CYBER2000.pptx
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Unit 1
Unit 1Unit 1
Unit 1
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
English in written
English in writtenEnglish in written
English in written
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 

Último

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Último (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Cyber crime

  • 2. RAJENDRA DANGWAL RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME B.TECH- IT 2
  • 4.  Cybercrime is nothing but where the computer used as an object or subject of crime. Cyber crime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications.  Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs. RAJENDRA DANGWAL, CYBER CRIME GEHU(BHIMTAL) 4
  • 5.  In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees.  Physical damage to computer systems was a prominent threat until the 1980s.  Programmers in the 1980s began writing malicious software, including self-replicating programs, to interfere with personal computers.  As the Internet increased access to increasing numbers of systems worldwide, criminals used unauthorized access to poorly protected systems for vandalism, political action and financial gain. RAJENDRA DANGWAL, CYBER CRIME GEHU(BHIMTAL) 5
  • 6. Criminal activity involving  Information technology infrastructure  Illegal access  Data interference  Misuse of devices  Forgery and  Electronic fraud. RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 6
  • 7. Types of Cyber Crime Hacking - Hacking in simple terms means an illegal intrusion into a computer system without permission of computer owner/user. Hackers write or use ready-made computer programs to attack the target computer. Software Piracy - Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. The unauthorized copying of software. RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 7
  • 8. Email spoofing - A spoofed email is one that appears to originate from one source but actually has been sent from another source. Phishing - The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has . RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 8
  • 9. CLASSIFICATION  Against Individuals  Against Organization  Against Society RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 9
  • 10.  Harassment via e-mails  Email spoofing  Defamation. Unauthorized control/access over computer system  Cheating & Fraud  Phishing RAJENDRA DANGWAL, CYBER CRIME GEHU(BHIMTAL) 10
  • 11. Unauthorized control/access over computer system. Possession of unauthorized information. Cyber terrorism against the government organization. Distribution of pirated software etc. RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 11
  • 12.  Polluting the youth through indecent exposure.  Trafficking  Financial crimes  Sale of illegal articles  Online gambling  Forgery RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 12
  • 14. PREVENTION OF CYBER CRIME  Anti-virus software .  Frequent password changing.  Firewalls.  Safe surfing.  Frequent virus checks.  Email filters. RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 14
  • 15.  User awareness is key to a secure computer/network  Do not open suspicious files/emails  Avoid using P2P programs  Avoid downloading freeware  If attacked, disconnect the network. Do not turn off the computer  So we must pay attention to all those issues and protect the World from Cyber Crime  “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. — White House Cybersecurity Advisor” ─ Richard Clarke RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 15