SlideShare uma empresa Scribd logo
1 de 34
o

“IT IS A CRIMINAL ACTIVITY
COMMITED ON THE INTERNET. THIS
IS A BROAD TERM THAT DESCRIBES
EVERYTHING FROM ELECTRONIS
CRACKING TO DENIAL OR SERVICE
ATTACKS THAT CAUSES
ELECTRONIC COMMERCE
SITES TO LOOSE MONEY.”
USA

CHINA

GERMANY

BRITAIN

BRAZIL

SPAIN

ITALY

FRANCE

TURKEY

POLAND

INDIA

RUSSIA

CANADA

SOUTH KOREA

TAIWAN

JAPAN

MEXICO

ARGENTINA

AUSTRALIA

ISRAEL
2% 2% 2% 2% 1%
1%
1%
2%
3% 2%
20%
8%
31%

3%

3%

5%
4%
4%3% 4%
There are 9 types of cyber crime.
1. Theft of telecommunications services.
2. Communications in furtherance of criminal
conspiracies.
3. Telecommunications piracy.
4. Dissemination of offensive materials.
5. Electronic money laundering and tax evasion.
6. Electronic vandalism, terrorism and extortion.
7. Sales and investment fraud.
8. Illegal interception of telecommunications.
9. Electronic funds transfer fraud.
Cyber Crime
Variants
1.) Hacking
“Hacking“ is a
crime, which
entails cracking
system and
gaining
unauthorized
access to the
data stored in
them. Hacking
had witnessed a
37 per cent
increase this year.

Fake document
Identity Theft
Social Engineering
Get Quick Rich Schemes

36%

9%

9%
46%


Hacking is done via network programming.
Hackers prepare programs to break network codes
and passwords. If you would have tried breaking
these codes until a few years ago, you wouldn't
have been successful in doing so if you didn't
possess enough programming knowledge.
However, the hacking methods have evolved over
the years and you are no longer required to have
extensive knowledge about network programming
in order to accomplish this task. With the hacking
methods becoming easier and tools getting
cheaper, cyber crime is on the rise.


While unauthorized hacking is a threat for the
society ethical hacking helps in various ways. The
ethical hackers are hired for assistance in
investigations. They are also hired to cover up
online fraud. For instance there are times when
banks need to hire them in order to hide the
activities of notorious hackers from the customers.
These activities may include stealing someone's
ATM or net banking pin. Till the time the bankers
sort out the issues they take help from hackers to
hide this fact from the customers so as to avoid any
kind of panic amongst them. Thus, hacking can be
helpful if done for a noble cause
TYPES OF HACKERS










White Hat
Grey Hat
Blue Hat
Script Kiddie
Black Hat
Elite Hat
Neophyte
Hacktivist

PURPOSE OF
UNETHICAL HACKING







Greed
Revenge
Greed
Adventure
Destruction
Access to forbidden
information




The use of Internet services or
software with Internet access
to defraud victims or to
otherwise take advantage of
them, for example by stealing
personal information, which
can even lead to identity theft.
A very common form of
Internet fraud is the
distribution of rogue security
software. Internet services can
be used to present fraudulent
solicitations to prospective
victims, to conduct fraudulent
transactions, or to transmit the
proceeds of fraud to financial
institutions or to others
connected with the scheme.
Internet fraud can occur in
chat rooms, email, message
boards, or on websites.

Column1
Current Employee for financial
Gain
Ex-Employee for Financial Gain
Disgruntled Ex- employee
Contracter
Extortion

34%

3%

9%
24%

18%
12%


Lottery frauds are most common online fraud that
happens every day on internet. Every day
Gmail, Yahoo or Hotmail like mailing portal users
receive mails regarding lottery. Such mails comes
with popular brand names saying that "You have
won 50 Million dollars" from CocaCola, Yahoo, Hotmail and other big names. When
you reply to those mails they ask for your bank
details to transfer your lottery money. When you
send them the details asked, then they ask you to
give a processing fee or handling charges. To tell
you the fact, such e mails are always misleading
and money is never transferred and your bank
details are used for other scams or frauds.


Spoof websites and e mails are also a form online fraud
and are resulted by technical expertise. In this, a fake
website is created which looks like an authentic
website, but actually that's a spoof. The purpose of
creating such website is to make the user enter
personal information and details of his account. Then
this information is used to login business and bank
accounts of that user. They get traffic to their spoof by
shooting spam e mails which misleads them to enter
their username and passwords which gets updated to
the hacker's server. And thus commit illegal financial
transaction making the owner go bankrupt. Be careful
to keep yourself away from any such fraud or scam.
Phishing
o

o

Phishing is a form cyber crime the employs expertise of
social engineering methods to obtain highly
confidential information such as passwords of online
accounts, pin numbers or codes, account number and
bank details, e mail account information and social
security number, etc. This is actually done by using the
name or identity of any trustworthy person or business
in an online communication via e mail or
chat, phishing experts get the details revealed like
passwords, account & personal information.
For ex: You can get a mail on the name your bank saying that
due to security reasons your required to change your password
for net banking account. Mostly, these mails warn you for
negative consequences if ignored.


Spoofing is also an illegal online activity which involves
intrusion masquerading a genuine user. In this activity a
hacker enters in to a distant computer illegally without any
authorization, using a different identity than his original
one. This is possible when hacker has already obtained
actual password somehow. The hacker then creates a new
user by misguiding computer to think that the hacker is a
genuine person to do that. Thus after that, the hacker
over takes the control of the system and can perform a
number frauds using the fake identity the hacker created.
For ex: You can get a mail on the name your bank saying
that due to security reasons your required to change your
password for net banking account. Mostly, these mails warn
you for negative consequences if ignored.
o

All the website providing mailing services like
Gmail, Yahoo or MSN etc update their data
base with the viruses and related mails and put
them in spam when they find it suspicious but
then also the hackers or spammers are very
smart to crack all and thus spread such fake e
mails. So if you get any such suspicious mail
then never ignore and after that check about
such virus on Google or antivirus websites
before taking any action and also do not
forward any spam e mails promising you any
kinds of reward points


Defamation is basically causing injury to the
reputation of a person or a company using false
statements or actions. It can be also described
as an attack on good faith name and reputation
of a person or company by someone who is not
in favor that person or company and thus want
to float some negative message in the society or
market. Defamation is considered to be a crime
in almost all the countries of the world
including India.
There are some more words which interpret
almost the same meaning as defamation –
calumny, vilification, traducement, slander and
libel. All these words explain defamation but
there are two major kinds of defamation Libel
& slander. Libel is visual defamation which can
be in the form of fake prints, misleading
pictures or deceptive videos. Libel may be used
for written, broadcasted or published
words, pictures or videos. This may lead
sufferer to hatred, contempt, ridicule and
disgrace by people, which may result in worst
consequences where people may start avoiding
him/her and that can injure the occupation or
business.


Slander is also a form of defamation other than
Libel (visual defamation). This form is related
with the use of transitory statements. It can be
explained as a defamation that some one
hear, does not see. For example- Someone is
talking wrong, spreading rumors and telling
lies about a person or a company. Slander is
basically an oral statement that is said with a
reason to injure the value and respect of the
person or company, which may hamper the
reputation, profession, trade or business.


There are some other critical reasons which
make it important to be aware of defamation
laws. One can always prove defamation in
words alone without any evidence, but it's
always an added advantage when there is a
confirm evidence of it. These evidences can be
any letter, e mail or an eye witnesses
confirming the defamation, etc. One does not
have to prove damages in defamation
cases, once the defamation is proved damages
are presumed. This means one does not have to
undergo tests to prove that the person was
injured mentally somehow or consulted to any
mental doctor or psychiatrist.
When any sort of defamation is done using internet
then it is called Cyber Defamation. Cyber
defamation is a crime which is conducted in
cyberspace mostly through the medium of Internet
with an aim to defame a person or a company.
With increasing use of Internet around the
globe, the graph of cyber defamation is increasing
like anything. All countries are incorporating cyber
laws and amending them in order to combat
against this very serious cyber crime called as
Cyber Defamation
Defamation – Section 499 IPC / Section 67 IT Act –


Whoever publishes or transmits or causes to be
published in the electronic form, any material which is
lascivious or appeals to the prurient interest or if its
effect is such as to tend to deprave and corrupt persons
who are likely, having regard to all relevant
circumstances, to read, see or hear the matter contained
or embodied in it, shall be punished on first conviction
with imprisonment of either description for a term
which may extend to five years and with fine which
may extend to one lakh rupees and in the event of a
second or subsequent conviction with imprisonment of
either description for a term which may extend to ten
years and also with fine which may extend to two lakh
rupees.


Identity Theft is another kind of very offensive cyber crime known
across the globe. Identity theft actually is way through which
criminals somehow obtains the personal information of people
who identity they want to use for any illegal purpose. The
criminal gets the key personal information & details like Driving
License Number, Social Security and Pin Codes of ATM and other
cards. Then criminal can use all that information for making
purchases online on the name of victim. The Identity theft can lead
to serious consequences as the criminal can use the information
for immigration or other such important applications. The most
serious consequence is that crime is often done by identity theft
experts who perform their task very meticulously and thus the
charge of crime comes on victim, whose identity has been theft.
There are two broad types of Identity Theft
- Account Takeover
- True Name Theft
Account
Takeover
True
Name
Theft

•Account Takeover is a kind of situation where
the criminal uses the information which he has
stolen in order to have the access of victim's
existing accounts.
•Then there may be further misuse using the
existing accounts like changing the address so
that bill does not reach to victim's place and
criminal can enjoy shopping and purchases
online through the credit cards the thief runs
up.

•True Name Theft, the thief by using the
personal information of the victim opens new
accounts. In this the thief can open new credit
card, cellular phones number, check books of
the existing account and may misuse all.
•Online facilities of banking and credit cards
called net baking has made things very easy for
these sort of thefts, where only passwords or
codes are the keys to do anything and real
verification has no role to play as such.












Don’t delete harmful communications ( messages, chat etc.) They will
provide vital information about system and address of the person
behind these.
Try not to panic.
If you feel any immediate physical danger contact your local police.
Avoid getting into huge arguments online during chat and discussion
with other users.
Remember that all other internet users are stranger; you do not know
who you are chatting with. So be careful.

Be extremely careful about how you share personal information
about yourself online.
Choose your chatting nickname carefully so as other.
Indian Crime Scene

Mais conteúdo relacionado

Mais procurados (19)

Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing
PhishingPhishing
Phishing
 
Lottery scam
Lottery scamLottery scam
Lottery scam
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 

Semelhante a Cyber crime

Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)Dhrumit Patel
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 

Semelhante a Cyber crime (20)

THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
123.pptx
123.pptx123.pptx
123.pptx
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 

Último

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Último (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Cyber crime

  • 1.
  • 2.
  • 3. o “IT IS A CRIMINAL ACTIVITY COMMITED ON THE INTERNET. THIS IS A BROAD TERM THAT DESCRIBES EVERYTHING FROM ELECTRONIS CRACKING TO DENIAL OR SERVICE ATTACKS THAT CAUSES ELECTRONIC COMMERCE SITES TO LOOSE MONEY.”
  • 5. There are 9 types of cyber crime. 1. Theft of telecommunications services. 2. Communications in furtherance of criminal conspiracies. 3. Telecommunications piracy. 4. Dissemination of offensive materials. 5. Electronic money laundering and tax evasion. 6. Electronic vandalism, terrorism and extortion. 7. Sales and investment fraud. 8. Illegal interception of telecommunications. 9. Electronic funds transfer fraud.
  • 6. Cyber Crime Variants 1.) Hacking “Hacking“ is a crime, which entails cracking system and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year. Fake document Identity Theft Social Engineering Get Quick Rich Schemes 36% 9% 9% 46%
  • 7.
  • 8.  Hacking is done via network programming. Hackers prepare programs to break network codes and passwords. If you would have tried breaking these codes until a few years ago, you wouldn't have been successful in doing so if you didn't possess enough programming knowledge. However, the hacking methods have evolved over the years and you are no longer required to have extensive knowledge about network programming in order to accomplish this task. With the hacking methods becoming easier and tools getting cheaper, cyber crime is on the rise.
  • 9.  While unauthorized hacking is a threat for the society ethical hacking helps in various ways. The ethical hackers are hired for assistance in investigations. They are also hired to cover up online fraud. For instance there are times when banks need to hire them in order to hide the activities of notorious hackers from the customers. These activities may include stealing someone's ATM or net banking pin. Till the time the bankers sort out the issues they take help from hackers to hide this fact from the customers so as to avoid any kind of panic amongst them. Thus, hacking can be helpful if done for a noble cause
  • 10. TYPES OF HACKERS         White Hat Grey Hat Blue Hat Script Kiddie Black Hat Elite Hat Neophyte Hacktivist PURPOSE OF UNETHICAL HACKING       Greed Revenge Greed Adventure Destruction Access to forbidden information
  • 11.   The use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them, for example by stealing personal information, which can even lead to identity theft. A very common form of Internet fraud is the distribution of rogue security software. Internet services can be used to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. Internet fraud can occur in chat rooms, email, message boards, or on websites. Column1 Current Employee for financial Gain Ex-Employee for Financial Gain Disgruntled Ex- employee Contracter Extortion 34% 3% 9% 24% 18% 12%
  • 12.
  • 13.  Lottery frauds are most common online fraud that happens every day on internet. Every day Gmail, Yahoo or Hotmail like mailing portal users receive mails regarding lottery. Such mails comes with popular brand names saying that "You have won 50 Million dollars" from CocaCola, Yahoo, Hotmail and other big names. When you reply to those mails they ask for your bank details to transfer your lottery money. When you send them the details asked, then they ask you to give a processing fee or handling charges. To tell you the fact, such e mails are always misleading and money is never transferred and your bank details are used for other scams or frauds.
  • 14.  Spoof websites and e mails are also a form online fraud and are resulted by technical expertise. In this, a fake website is created which looks like an authentic website, but actually that's a spoof. The purpose of creating such website is to make the user enter personal information and details of his account. Then this information is used to login business and bank accounts of that user. They get traffic to their spoof by shooting spam e mails which misleads them to enter their username and passwords which gets updated to the hacker's server. And thus commit illegal financial transaction making the owner go bankrupt. Be careful to keep yourself away from any such fraud or scam.
  • 15. Phishing o o Phishing is a form cyber crime the employs expertise of social engineering methods to obtain highly confidential information such as passwords of online accounts, pin numbers or codes, account number and bank details, e mail account information and social security number, etc. This is actually done by using the name or identity of any trustworthy person or business in an online communication via e mail or chat, phishing experts get the details revealed like passwords, account & personal information. For ex: You can get a mail on the name your bank saying that due to security reasons your required to change your password for net banking account. Mostly, these mails warn you for negative consequences if ignored.
  • 16.  Spoofing is also an illegal online activity which involves intrusion masquerading a genuine user. In this activity a hacker enters in to a distant computer illegally without any authorization, using a different identity than his original one. This is possible when hacker has already obtained actual password somehow. The hacker then creates a new user by misguiding computer to think that the hacker is a genuine person to do that. Thus after that, the hacker over takes the control of the system and can perform a number frauds using the fake identity the hacker created. For ex: You can get a mail on the name your bank saying that due to security reasons your required to change your password for net banking account. Mostly, these mails warn you for negative consequences if ignored.
  • 17. o All the website providing mailing services like Gmail, Yahoo or MSN etc update their data base with the viruses and related mails and put them in spam when they find it suspicious but then also the hackers or spammers are very smart to crack all and thus spread such fake e mails. So if you get any such suspicious mail then never ignore and after that check about such virus on Google or antivirus websites before taking any action and also do not forward any spam e mails promising you any kinds of reward points
  • 18.
  • 19.  Defamation is basically causing injury to the reputation of a person or a company using false statements or actions. It can be also described as an attack on good faith name and reputation of a person or company by someone who is not in favor that person or company and thus want to float some negative message in the society or market. Defamation is considered to be a crime in almost all the countries of the world including India.
  • 20. There are some more words which interpret almost the same meaning as defamation – calumny, vilification, traducement, slander and libel. All these words explain defamation but there are two major kinds of defamation Libel & slander. Libel is visual defamation which can be in the form of fake prints, misleading pictures or deceptive videos. Libel may be used for written, broadcasted or published words, pictures or videos. This may lead sufferer to hatred, contempt, ridicule and disgrace by people, which may result in worst consequences where people may start avoiding him/her and that can injure the occupation or business.
  • 21.  Slander is also a form of defamation other than Libel (visual defamation). This form is related with the use of transitory statements. It can be explained as a defamation that some one hear, does not see. For example- Someone is talking wrong, spreading rumors and telling lies about a person or a company. Slander is basically an oral statement that is said with a reason to injure the value and respect of the person or company, which may hamper the reputation, profession, trade or business.
  • 22.  There are some other critical reasons which make it important to be aware of defamation laws. One can always prove defamation in words alone without any evidence, but it's always an added advantage when there is a confirm evidence of it. These evidences can be any letter, e mail or an eye witnesses confirming the defamation, etc. One does not have to prove damages in defamation cases, once the defamation is proved damages are presumed. This means one does not have to undergo tests to prove that the person was injured mentally somehow or consulted to any mental doctor or psychiatrist.
  • 23. When any sort of defamation is done using internet then it is called Cyber Defamation. Cyber defamation is a crime which is conducted in cyberspace mostly through the medium of Internet with an aim to defame a person or a company. With increasing use of Internet around the globe, the graph of cyber defamation is increasing like anything. All countries are incorporating cyber laws and amending them in order to combat against this very serious cyber crime called as Cyber Defamation Defamation – Section 499 IPC / Section 67 IT Act –
  • 24.  Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to one lakh rupees and in the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to ten years and also with fine which may extend to two lakh rupees.
  • 25.
  • 26.  Identity Theft is another kind of very offensive cyber crime known across the globe. Identity theft actually is way through which criminals somehow obtains the personal information of people who identity they want to use for any illegal purpose. The criminal gets the key personal information & details like Driving License Number, Social Security and Pin Codes of ATM and other cards. Then criminal can use all that information for making purchases online on the name of victim. The Identity theft can lead to serious consequences as the criminal can use the information for immigration or other such important applications. The most serious consequence is that crime is often done by identity theft experts who perform their task very meticulously and thus the charge of crime comes on victim, whose identity has been theft. There are two broad types of Identity Theft - Account Takeover - True Name Theft
  • 27.
  • 28. Account Takeover True Name Theft •Account Takeover is a kind of situation where the criminal uses the information which he has stolen in order to have the access of victim's existing accounts. •Then there may be further misuse using the existing accounts like changing the address so that bill does not reach to victim's place and criminal can enjoy shopping and purchases online through the credit cards the thief runs up. •True Name Theft, the thief by using the personal information of the victim opens new accounts. In this the thief can open new credit card, cellular phones number, check books of the existing account and may misuse all. •Online facilities of banking and credit cards called net baking has made things very easy for these sort of thefts, where only passwords or codes are the keys to do anything and real verification has no role to play as such.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.        Don’t delete harmful communications ( messages, chat etc.) They will provide vital information about system and address of the person behind these. Try not to panic. If you feel any immediate physical danger contact your local police. Avoid getting into huge arguments online during chat and discussion with other users. Remember that all other internet users are stranger; you do not know who you are chatting with. So be careful. Be extremely careful about how you share personal information about yourself online. Choose your chatting nickname carefully so as other.