Submitted to :-
Nikhar Bhatnagar
Submitted by :-
Anuj Chaturvedi
1
PRESENTATION
ON
“CYBER CRIME
AND
CHILD PRONOGRAPHY”
POO...
Walkthrough
Introduction
Types of Cyber Crime
Child Pornography
Safety tips
3
INTRODUCTION
Cyber crime refers to any crime that
involves a computer/mobile and a network.
The computer may have been u...
 A total number of 90, 119, 252 and 219 Government websites tracked by
the Indian Computer Emergency Response Team (CERT-...
Types of Cyber attacks (source- FBI)
 Computer as a Target : using a computer to attack other computers
e.g. Hacking, vir...
The Internet is being highly used
by its abusers to reach and abuse
children sexually, worldwide. As
more homes have acces...
History of Internet Pornography
 February 1993 – The internet is
made public
 March 1993 – The largest child
pornography...
How they operate
They operate Pedophiles use false identity to trap
the children , Pedophiles connect children in
various ...
Use antivirus
software and
insert
firewalls
uninstall
unnecessary
software
maintain
backup and
check
security
settings`
St...
Queries
10
Próximos SlideShares
Carregando em…5
×

ppt on child pornography and cyber crime

2.423 visualizações

Publicada em

ppt on cyber crime and child pornography

Publicada em: Engenharia
  • Seja o primeiro a comentar

ppt on child pornography and cyber crime

  1. 1. Submitted to :- Nikhar Bhatnagar Submitted by :- Anuj Chaturvedi 1 PRESENTATION ON “CYBER CRIME AND CHILD PRONOGRAPHY” POORNIMA GROUP OF INSTITUTIONS, JAIPUR DEPARTMENT OF COMPUTER SCIENCE POORNIMA GROUP OF INSTITUTIONS BT-1, BT PARK SITAPURA JAIPUR (Raj.)-302022
  2. 2. Walkthrough Introduction Types of Cyber Crime Child Pornography Safety tips
  3. 3. 3 INTRODUCTION Cyber crime refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  4. 4.  A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked by various hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively.
  5. 5. Types of Cyber attacks (source- FBI)  Computer as a Target : using a computer to attack other computers e.g. Hacking, virus/worms attacks etc.  Computer as a Weapon : using a computer to commit real world crimes. e.g. Cyber terrorism, Child pornography etc. ◦ Financial fraud 11% ◦ Cyber threats(Theft of information) 20% ◦ Cyber Warfare 25% ◦ Drug Trafficking 27% ◦ Cyber Terrorism &extortion 71% ◦ Child Pornography 79% ◦ Viruses 85%
  6. 6. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles. Writings, pictures, films, etc. designed to stimulate sexual excitement
  7. 7. History of Internet Pornography  February 1993 – The internet is made public  March 1993 – The largest child pornography investigation in history begins  1995 – A study is conducted that said that about 80% of internet usage is from pornography
  8. 8. How they operate They operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children. Cont..  2004 – China attempts to ban internet pornography  2009 – Media Streaming is improved and bandwidth costs drop
  9. 9. Use antivirus software and insert firewalls uninstall unnecessary software maintain backup and check security settings` Stay anonymous - choose a genderless screen name
  10. 10. Queries 10

×