SlideShare a Scribd company logo
1 of 14
Cyber Crime
Bhavya Mohindru & Adhiraj Goel
Apeejay School Saket
Contents
 Introduction.
 Definition.
 History.
 Cyber threat evolution.
 Categories of cyber crime.
 Types of cyber crime.
 Prevention.
 Security.
 Conclusion.
Introduction
 The internet in India is growing rapidly. It has given rise to new
opportunities in every field we can think of be it entertainment,
business, sports or education.
 There're two sides to a coin. Internet also has it's own
disadvantages is Cyber crime- illegal activity committed on the
internet.
Defining CyberCrime
 Crime committed using a computer and the internet to steal data or
information.
 Illegal imports.
 Malicious programs.
Cybercrime is nothing
but where the computer
used as an object or
subject of crime..
Cyber Threat Evolution
Types Of CyberCrime
 Hacking
 Denial of service attack
 Virus Dissemination
 Computer Vandalism
 Cyber Terrorism
 Software Piracy
Hacking
 Hacking in simple terms means an illegal intrusion into a computer
system and/or network.
Denial Of Service Attack
 Act by the criminal, who floods the bandwidth of the victims
network.
 Is his e-mail box with spam mail depriving him of the services.
Virus Dissemination
 Malicious software that attaches itself to other software. (virus, worms,
Trojan Horse, web jacking, e-mail bombing etc.)
Computer Vandalism
 Damaging or destroying data rather than stealing.
 Transmitting virus
Cyber Terrorism
 Use of Internet based attacks in terrorist activities.
 Technology savvy terrorists are using 512-bit encryption, which is
impossible to decrypt.
Software Piracy
 Theft of software through the illegal copying of genuine programs.
 Distribution of products intended to pass for the original.
Types Of CyberAttacks By
Percentage
• Financial fraud: 11%
• Sabotage of data/networks: 17%
• Theft of proprietary information: 20%
• System penetration from the outside: 25%
• Denial of service: 27%
• Unauthorized access by insiders: 71%
• Employee abuse of internet privileges 79%
• Viruses 85%

More Related Content

What's hot (20)

CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Viewers also liked

Viewers also liked (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
fiverays
fiveraysfiverays
fiverays
 
Youth in the CIS and New Media
Youth in the CIS and New Media Youth in the CIS and New Media
Youth in the CIS and New Media
 
Youth and Gun Violence
Youth and Gun ViolenceYouth and Gun Violence
Youth and Gun Violence
 
Crime and Deviance
Crime and DevianceCrime and Deviance
Crime and Deviance
 
Crime and young people
Crime and young peopleCrime and young people
Crime and young people
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
CRIMES
CRIMESCRIMES
CRIMES
 
Session 5 youth crime the media.2016
Session 5  youth crime  the media.2016Session 5  youth crime  the media.2016
Session 5 youth crime the media.2016
 
Crime & Violence
Crime & ViolenceCrime & Violence
Crime & Violence
 
Sgp Powerpoint School Violence
Sgp Powerpoint School ViolenceSgp Powerpoint School Violence
Sgp Powerpoint School Violence
 
Youth related crimes
Youth related crimesYouth related crimes
Youth related crimes
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Hacking
HackingHacking
Hacking
 

Similar to Cyber Crime (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 
Cyber security
Cyber security        Cyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Presentation(Cyber crime & security)
Presentation(Cyber crime & security)Presentation(Cyber crime & security)
Presentation(Cyber crime & security)
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 

More from bhavya mohindru

India - My Motherland, My Country
India - My Motherland, My CountryIndia - My Motherland, My Country
India - My Motherland, My Countrybhavya mohindru
 
William Shakespeare - To be or not to be
William Shakespeare - To be or not to beWilliam Shakespeare - To be or not to be
William Shakespeare - To be or not to bebhavya mohindru
 
Global warming - Let's save our Earth
Global warming - Let's save our EarthGlobal warming - Let's save our Earth
Global warming - Let's save our Earthbhavya mohindru
 
Earthquakes - It's Causes And Effects
Earthquakes - It's Causes And EffectsEarthquakes - It's Causes And Effects
Earthquakes - It's Causes And Effectsbhavya mohindru
 
Health and hygiene with Bhavya Mohindru
Health and hygiene with Bhavya Mohindru Health and hygiene with Bhavya Mohindru
Health and hygiene with Bhavya Mohindru bhavya mohindru
 
Lamborghini 10 best cars
Lamborghini 10 best carsLamborghini 10 best cars
Lamborghini 10 best carsbhavya mohindru
 

More from bhavya mohindru (12)

India - My Motherland, My Country
India - My Motherland, My CountryIndia - My Motherland, My Country
India - My Motherland, My Country
 
William Shakespeare - To be or not to be
William Shakespeare - To be or not to beWilliam Shakespeare - To be or not to be
William Shakespeare - To be or not to be
 
Global warming - Let's save our Earth
Global warming - Let's save our EarthGlobal warming - Let's save our Earth
Global warming - Let's save our Earth
 
Air Around Us Edited
Air Around Us EditedAir Around Us Edited
Air Around Us Edited
 
Fun With Magnets
Fun With MagnetsFun With Magnets
Fun With Magnets
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Air Around Us
Air Around UsAir Around Us
Air Around Us
 
Earthquakes - It's Causes And Effects
Earthquakes - It's Causes And EffectsEarthquakes - It's Causes And Effects
Earthquakes - It's Causes And Effects
 
Health and hygiene with Bhavya Mohindru
Health and hygiene with Bhavya Mohindru Health and hygiene with Bhavya Mohindru
Health and hygiene with Bhavya Mohindru
 
Internet safety
Internet safety Internet safety
Internet safety
 
Lamborghini
Lamborghini Lamborghini
Lamborghini
 
Lamborghini 10 best cars
Lamborghini 10 best carsLamborghini 10 best cars
Lamborghini 10 best cars
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 

Recently uploaded (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Cyber Crime

  • 1. Cyber Crime Bhavya Mohindru & Adhiraj Goel Apeejay School Saket
  • 2. Contents  Introduction.  Definition.  History.  Cyber threat evolution.  Categories of cyber crime.  Types of cyber crime.  Prevention.  Security.  Conclusion.
  • 3. Introduction  The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.  There're two sides to a coin. Internet also has it's own disadvantages is Cyber crime- illegal activity committed on the internet.
  • 4. Defining CyberCrime  Crime committed using a computer and the internet to steal data or information.  Illegal imports.  Malicious programs.
  • 5. Cybercrime is nothing but where the computer used as an object or subject of crime..
  • 7. Types Of CyberCrime  Hacking  Denial of service attack  Virus Dissemination  Computer Vandalism  Cyber Terrorism  Software Piracy
  • 8. Hacking  Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  • 9. Denial Of Service Attack  Act by the criminal, who floods the bandwidth of the victims network.  Is his e-mail box with spam mail depriving him of the services.
  • 10. Virus Dissemination  Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 11. Computer Vandalism  Damaging or destroying data rather than stealing.  Transmitting virus
  • 12. Cyber Terrorism  Use of Internet based attacks in terrorist activities.  Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 13. Software Piracy  Theft of software through the illegal copying of genuine programs.  Distribution of products intended to pass for the original.
  • 14. Types Of CyberAttacks By Percentage • Financial fraud: 11% • Sabotage of data/networks: 17% • Theft of proprietary information: 20% • System penetration from the outside: 25% • Denial of service: 27% • Unauthorized access by insiders: 71% • Employee abuse of internet privileges 79% • Viruses 85%