SlideShare uma empresa Scribd logo
1 de 24
Name of group members are…
          Mayur Sharma.
          Manoj Sharma.
          Jay Visavadiya.
          Jigar Chauhan.
        MBA 3rd SEM H.R.M
   Project mentor: - Urvee Madam
The presentation is presented at




               &
    Topic   of presentation.
      TYPES OF CYBER CRIME
Why learn about CYBER CRIME ?


Because –
– Everybody is using COMPUTERS..
– From white collar criminals to terrorist organizations
  And from Teenagers to Adults.
– Conventional crimes like
  Forgery, extortions, kidnapping etc.. are being
  committed with the help off computers
– New generation is growing up with computers.
– MOST IMPORTANT - Monetary transactions are moving
  on to the INTERNET.
WHAT IS CYBER CRIME?

 All crimes performed or resorted to by abuse of
 electronic media or otherwise, with the purpose
 of influencing the functioning of computer or
 computer system.
              IN SHORT
• COMPUTER CRIME is any crime where –
   – Computer is a target.
   – Computer is a tool of crime
   – Computer is incidental to crime
PROFILE OF CYBER CRIME            VICTIMS


• Disgruntled employees..   • Gullible

• Teenagers..               • Desperados and greedy

• Professional Hackers..      people

• Business Rival..          • Unskilled & Inexperienced

• Ex-Boy Friend..           • Unlucky people

• Divorced Husband.. etc
TYPES OF CYBER CRIME

NOTE: - This is not exhaustive list of cyber crime
1. HACKING                           8. NET EXTORTION
2. DENIAL OF SERVICE                 9. PHISHING
   ATTACK                            10.SPOOFING
3. VIRUS DISSEMINATION               11.CYBER STALKING
4. SOFTWARE PIRACY                   12.CYBER DEFAMATION
5. PORNOGRAPHY                       13.THREATENING
6. IRC Crime                         14.SALAMI ATTACK
7. CREDIT CARD FRAUD                 15.SALE OF NARCOTICS
1. HACKING

Hacking in simple terms means illegal intrusion
into a computer system without the permission
of the computer owner/user.
2. DENIAL OF SERVICE ATTACK 3. VIRUS DISSEMINATION



 • This is an act by the     • Malicious software
   criminal, who floods        that attaches itself to
   the bandwidth of the        other        software.
   victim‘s network or         (virus, worms, Trojan
   fill's his e-mail box       Horse,           Time
   with      spam    mail      bomb,            Logic
   depriving him of the        Bomb, Rabbit and
   services he is entitled     Bacterium are the
   to access or provide.       malicious
                               software's).
4. SOFTWARE PIRACY

 Theft of software through the illegal copying of
  genuine programs or the counterfeiting and
  distribution of products intended to pass for the
  original..
 Retail revenue losses worldwide are ever
  increasing due to this crime.
 Can be done in various ways-
    End        user       copying,,      Hard       disk
    loading, Counterfeiting, Illegal downloads from the
    internet etc.
5. PORNOGRAPHY

 Pornography is the first consistently successful ecommerce
  product.
 Deceptive marketing tactics and mouse trapping
  technologies Pornography encourage customers to access
  their websites.
 Anybody including children can log on to the internet and
  access websites with pornographic contents with a click of
  a mouse.
 Publishing, transmitting any material in electronic form
  which is lascivious or appeals to the prurient interest is an
  offence under the provisions of section 67 of I.T. Act -2000.
6. IRC CRIME

Internet Relay Chat (IRC) servers have chat rooms in which
people from anywhere the world can come together and
chat with each other.
– Criminals use it for meeting.
– Hackers use it for discussing their exploits / sharing the
  techniques.
– Paedophiles use chat rooms to allure small children.
– Cyber Stalking - In order to harass a woman her
  telephone number is given to others as if she wants to
  befriend males.
7. CREDIT CARD FRAUD

• You simply have to type credit card number into www
  page off the vendor for online transaction.
• If electronic transactions are not secured the credit card
  numbers can be stolen by the hackers who can misuse
  this card by impersonating the credit card owner.
             Credit card skimmer
How the credit card skimmer is used

Credit card skimmer, is used to collect the data of user
before it swapped.
Additional Slot In ATM Machine
False pamphlet Box Affixed to ATM Cubical side
Inside the False pamphlet Box
                                Camera position
                                at correct angle to
                                view keypad &
                                monitor.
8. NET EXTORTION         9. PHISHING


• Copying the            • It is technique of
  company’s                pulling out
  confidential data in     confidential
  order to extort said     information from the
  company for huge         bank/financial
  amount..                 institutional account
                           holders by deceptive
                           means.
Actual login page   Fake login page
10. Spoofing               11. CYBER STALKING


• Getting one computer     • The Criminal follows
  on a network to            the     victim    by
  pretend to have the        sending
  identity off another
  computer, usually one
                             emails, entering the
  with special access        chat           rooms
  privileges , so as to      frequently.
  obtain access to the
  other computers on the
  network.
12) CYBER DEFAMATION         13) THREATENING



• The Criminal sends emails • The Criminal sends
  containing     defamatory   threatening email or
  matters to all concerned    comes in contact in chat
  off the victim or post the  rooms with victim.
  defamatory matters on a
  website..
• (disgruntled    employee • (Any one disgruntled
  may do this against         may do this against
  boss,, ex-boys friend       boss, friend or official)
  against girl, divorced
  husband against wife etc)
14) SALAMI ATTACK                    15) SALE OF NARCOTICS


• In such crime criminal makes       • Sale & Purchase through
  insignificant changes in such a      net..
  manner that such changes would
                                     • There are web site which
  go unnoticed.
                                       offer sale and
• Criminal makes such program
  that deducts small amount like     • Shipment off contrabands
  Rs. 2.50 per month from the          drugs..
  account of all the customer of     • They may use the techniques
  the Bank and deposit the same in     off
  his account. In this case no
                                     • Stegnography for hiding the
  account holder will approach the
  bank for such small amount but
                                       messages..
  criminal gains huge amount.
ANY QUESTIONS ?????
                      PLEASE ASK




             OR
Legal (Types of Cyber Crime)

Mais conteúdo relacionado

Mais procurados (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
cyber crime
cyber crimecyber crime
cyber crime
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber law
Cyber lawCyber law
Cyber law
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 

Destaque

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
UNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIAUNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIAkikayfernandez
 
The software as an educational resource copy
The software as an educational resource   copyThe software as an educational resource   copy
The software as an educational resource copymiss yhda
 
Lesson 13: Cooperative learning with the Computer
Lesson 13: Cooperative learning with the ComputerLesson 13: Cooperative learning with the Computer
Lesson 13: Cooperative learning with the Computerjemarmata
 
Understanding hypermedia
Understanding hypermediaUnderstanding hypermedia
Understanding hypermediaLeslie Nicdao
 
The Internet and Education
The Internet and EducationThe Internet and Education
The Internet and Educationleaniesurilla
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 

Destaque (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
UNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIAUNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIA
 
The software as an educational resource copy
The software as an educational resource   copyThe software as an educational resource   copy
The software as an educational resource copy
 
Lesson 13: Cooperative learning with the Computer
Lesson 13: Cooperative learning with the ComputerLesson 13: Cooperative learning with the Computer
Lesson 13: Cooperative learning with the Computer
 
Understanding hypermedia
Understanding hypermediaUnderstanding hypermedia
Understanding hypermedia
 
The Internet and Education
The Internet and EducationThe Internet and Education
The Internet and Education
 
Types of Crime
 Types of Crime  Types of Crime
Types of Crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Semelhante a Legal (Types of Cyber Crime)

workers participation in management
workers participation in managementworkers participation in management
workers participation in managementlily004
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
CYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfCYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfannaielectronicsvill
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminalsOnline
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptxClichesin
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 

Semelhante a Legal (Types of Cyber Crime) (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in management
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfCYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdf
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Legal (Types of Cyber Crime)

  • 1.
  • 2. Name of group members are… Mayur Sharma. Manoj Sharma. Jay Visavadiya. Jigar Chauhan. MBA 3rd SEM H.R.M Project mentor: - Urvee Madam
  • 3. The presentation is presented at & Topic of presentation. TYPES OF CYBER CRIME
  • 4. Why learn about CYBER CRIME ? Because – – Everybody is using COMPUTERS.. – From white collar criminals to terrorist organizations And from Teenagers to Adults. – Conventional crimes like Forgery, extortions, kidnapping etc.. are being committed with the help off computers – New generation is growing up with computers. – MOST IMPORTANT - Monetary transactions are moving on to the INTERNET.
  • 5. WHAT IS CYBER CRIME? All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. IN SHORT • COMPUTER CRIME is any crime where – – Computer is a target. – Computer is a tool of crime – Computer is incidental to crime
  • 6. PROFILE OF CYBER CRIME VICTIMS • Disgruntled employees.. • Gullible • Teenagers.. • Desperados and greedy • Professional Hackers.. people • Business Rival.. • Unskilled & Inexperienced • Ex-Boy Friend.. • Unlucky people • Divorced Husband.. etc
  • 7. TYPES OF CYBER CRIME NOTE: - This is not exhaustive list of cyber crime 1. HACKING 8. NET EXTORTION 2. DENIAL OF SERVICE 9. PHISHING ATTACK 10.SPOOFING 3. VIRUS DISSEMINATION 11.CYBER STALKING 4. SOFTWARE PIRACY 12.CYBER DEFAMATION 5. PORNOGRAPHY 13.THREATENING 6. IRC Crime 14.SALAMI ATTACK 7. CREDIT CARD FRAUD 15.SALE OF NARCOTICS
  • 8. 1. HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
  • 9. 2. DENIAL OF SERVICE ATTACK 3. VIRUS DISSEMINATION • This is an act by the • Malicious software criminal, who floods that attaches itself to the bandwidth of the other software. victim‘s network or (virus, worms, Trojan fill's his e-mail box Horse, Time with spam mail bomb, Logic depriving him of the Bomb, Rabbit and services he is entitled Bacterium are the to access or provide. malicious software's).
  • 10. 4. SOFTWARE PIRACY  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original..  Retail revenue losses worldwide are ever increasing due to this crime.  Can be done in various ways- End user copying,, Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.
  • 11. 5. PORNOGRAPHY  Pornography is the first consistently successful ecommerce product.  Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites.  Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse.  Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000.
  • 12. 6. IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other. – Criminals use it for meeting. – Hackers use it for discussing their exploits / sharing the techniques. – Paedophiles use chat rooms to allure small children. – Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males.
  • 13. 7. CREDIT CARD FRAUD • You simply have to type credit card number into www page off the vendor for online transaction. • If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner. Credit card skimmer
  • 14. How the credit card skimmer is used Credit card skimmer, is used to collect the data of user before it swapped.
  • 15. Additional Slot In ATM Machine
  • 16. False pamphlet Box Affixed to ATM Cubical side
  • 17. Inside the False pamphlet Box Camera position at correct angle to view keypad & monitor.
  • 18. 8. NET EXTORTION 9. PHISHING • Copying the • It is technique of company’s pulling out confidential data in confidential order to extort said information from the company for huge bank/financial amount.. institutional account holders by deceptive means.
  • 19. Actual login page Fake login page
  • 20. 10. Spoofing 11. CYBER STALKING • Getting one computer • The Criminal follows on a network to the victim by pretend to have the sending identity off another computer, usually one emails, entering the with special access chat rooms privileges , so as to frequently. obtain access to the other computers on the network.
  • 21. 12) CYBER DEFAMATION 13) THREATENING • The Criminal sends emails • The Criminal sends containing defamatory threatening email or matters to all concerned comes in contact in chat off the victim or post the rooms with victim. defamatory matters on a website.. • (disgruntled employee • (Any one disgruntled may do this against may do this against boss,, ex-boys friend boss, friend or official) against girl, divorced husband against wife etc)
  • 22. 14) SALAMI ATTACK 15) SALE OF NARCOTICS • In such crime criminal makes • Sale & Purchase through insignificant changes in such a net.. manner that such changes would • There are web site which go unnoticed. offer sale and • Criminal makes such program that deducts small amount like • Shipment off contrabands Rs. 2.50 per month from the drugs.. account of all the customer of • They may use the techniques the Bank and deposit the same in off his account. In this case no • Stegnography for hiding the account holder will approach the bank for such small amount but messages.. criminal gains huge amount.
  • 23. ANY QUESTIONS ????? PLEASE ASK OR