SlideShare uma empresa Scribd logo
1 de 10
CRIMINOLOGY
TOPIC- CYBER CRIME
PREPARED BY - AFNAN HUSAIN
CLASS - SY LLB (SEM 4)
SEAT NO. - 40015
WHAT IS CYBER CRIME?
• A cyber crime may be defined as any illegal criminal activity
that uses a computer either as an instrumentality, target or
means of perpetrating further crime.
• In other words cyber crime is an unlawful act wherein the
computer is either a tool or a target or both.
• Cyber crime is any crime that takes place online or primarily
online. Cyber criminals often commit crimes by targeting
computer network and devices.
• Cyber crime can range from security breaches to identity theft,
and includes cyber stalking, harassment, bullying and child
sexual exploitation.
• Terrorists collaborate on the internet to carry out their illegal
activities in cyberspace. Cyber crime continues to evolve with
new threats surfacing all over the world.
• The distinction between cyber crime and conventional crime
lies in the involvement of the medium in cases of cyber crime.
That is, there should be involvement, at any stage, of the virtual
cyber medium in case of a cyber crime.
NATURE OF CYBER CRIME
• Cyber space and internet having developed as favourite
medium of carrying on wide range of activities, has at the same
time became an easy and convenient mode of committing cyber
crime the world over, which can be detected only with the
international co-operation of law enforcement agencies of
different countries.
• In April 2010, at the Twelfth UN Congress on Crime Prevention
and Criminal Justice held extensive discussion expressing
serious concern over the massive use of computer science and
technology by the perpetrators of cyber crime and measure to
be adopted by authorities in fighting against these crimes.
REASONS FOR CYBER CRIME
• The computer has the unique characteristic of storing data in a
relatively very small space.
• Computer are easy to access and therefore, unauthorised
access by the use of complex cyber space technology is easily
possible by passing security system.
• The computers work on operating system which are complex
and are composed of millions of codes. The cyber offenders
take advantage of this.
• One of the significant features of the computer system is that
evidence is destroyed in no time. The criminals find it very easy
to destroy the evidence soon after the crime is committed.
TYPES OF CYBER CRIME
• Hacking: Hacking in simple terms means an illegal intrusion
into a computer system and/or network.
• E- mail Spoofing: A spoofed e-mail may be said to be one
which misrepresents its origin. That is, it shows its origin to be
different from which it actually originates.
• Computer Vandalism: Any kind of physical damage done to the
computer of any person. It may be in the form of theft of a
computer or some part thereof.
• Cyber Terrorism: Cyber terrorism may be said to be a
convergence of terrorism and cyber space involving unlawful
attacks or threats of attacks against computers, networks, and
the information stored therein, in order to coerce or intimidate
a government or its people in furtherance of political, social, or
ideological objectives.
• Cyber Pornography: Computers and internet have opened new
flood gates for pornographic material being available on
websites which has adverse effect on moral health of
youngsters, particularly adolescents.
OTHER TYPES OF CYBER CRIMES
• Cyber Stalking
• Cyber Defamation
• E-mail Frauds
• Identity Theft
• Data Diddling
• Phishing
HOW TO AVOID BECOMING A VICTIM OF
CERTAIN TYPES OF CYBER CRIME
• Don’t enter private and confidential information on your
personal computer.
• Always use a firewall. Also, always use one or two anti-spyware
programs in addition to your anti-virus software, and keep
them up to date
• Don't reply to an email or pop-up message that asks for
personal or financial information, and don't click on links in the
message
• Store your information elsewhere apart from your PC like on a
flash disk or an external hard drive
• Download a safe search tool like SiteAdvisor which will advise
IMPACT OF CYBER CRIME
• The expansion of internet and computer all over the world has
generated a new species of crime commonly known as cyber
crimes. The areas most hit by the impact of these crimes is,
economy and security regimes because the alarmingly
expanding dimensions of cyber frauds and terrorists activities
of hardcore terrorists are ruining the nation’s economy and
posing a threat to the national security destroying its internal
and external peace.
• Looking to the international dimensions of these crimes and
jurisdictional problems between the countries and variations in
the cyber law, the electronic transaction and liability issues for
the acts executed in cyberspace still remain hazy and uncertain

Mais conteúdo relacionado

Mais procurados (20)

Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Software piracy
Software piracySoftware piracy
Software piracy
 

Semelhante a Cyber Crime (20)

Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 

Último

一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理bd2c5966a56d
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理e9733fc35af6
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理e9733fc35af6
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理Airst S
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理Airst S
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理Fir La
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 

Último (20)

一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 

Cyber Crime

  • 1. CRIMINOLOGY TOPIC- CYBER CRIME PREPARED BY - AFNAN HUSAIN CLASS - SY LLB (SEM 4) SEAT NO. - 40015
  • 2. WHAT IS CYBER CRIME? • A cyber crime may be defined as any illegal criminal activity that uses a computer either as an instrumentality, target or means of perpetrating further crime. • In other words cyber crime is an unlawful act wherein the computer is either a tool or a target or both. • Cyber crime is any crime that takes place online or primarily online. Cyber criminals often commit crimes by targeting computer network and devices.
  • 3. • Cyber crime can range from security breaches to identity theft, and includes cyber stalking, harassment, bullying and child sexual exploitation. • Terrorists collaborate on the internet to carry out their illegal activities in cyberspace. Cyber crime continues to evolve with new threats surfacing all over the world. • The distinction between cyber crime and conventional crime lies in the involvement of the medium in cases of cyber crime. That is, there should be involvement, at any stage, of the virtual cyber medium in case of a cyber crime.
  • 4. NATURE OF CYBER CRIME • Cyber space and internet having developed as favourite medium of carrying on wide range of activities, has at the same time became an easy and convenient mode of committing cyber crime the world over, which can be detected only with the international co-operation of law enforcement agencies of different countries. • In April 2010, at the Twelfth UN Congress on Crime Prevention and Criminal Justice held extensive discussion expressing serious concern over the massive use of computer science and technology by the perpetrators of cyber crime and measure to be adopted by authorities in fighting against these crimes.
  • 5. REASONS FOR CYBER CRIME • The computer has the unique characteristic of storing data in a relatively very small space. • Computer are easy to access and therefore, unauthorised access by the use of complex cyber space technology is easily possible by passing security system. • The computers work on operating system which are complex and are composed of millions of codes. The cyber offenders take advantage of this. • One of the significant features of the computer system is that evidence is destroyed in no time. The criminals find it very easy to destroy the evidence soon after the crime is committed.
  • 6. TYPES OF CYBER CRIME • Hacking: Hacking in simple terms means an illegal intrusion into a computer system and/or network. • E- mail Spoofing: A spoofed e-mail may be said to be one which misrepresents its origin. That is, it shows its origin to be different from which it actually originates. • Computer Vandalism: Any kind of physical damage done to the computer of any person. It may be in the form of theft of a computer or some part thereof.
  • 7. • Cyber Terrorism: Cyber terrorism may be said to be a convergence of terrorism and cyber space involving unlawful attacks or threats of attacks against computers, networks, and the information stored therein, in order to coerce or intimidate a government or its people in furtherance of political, social, or ideological objectives. • Cyber Pornography: Computers and internet have opened new flood gates for pornographic material being available on websites which has adverse effect on moral health of youngsters, particularly adolescents.
  • 8. OTHER TYPES OF CYBER CRIMES • Cyber Stalking • Cyber Defamation • E-mail Frauds • Identity Theft • Data Diddling • Phishing
  • 9. HOW TO AVOID BECOMING A VICTIM OF CERTAIN TYPES OF CYBER CRIME • Don’t enter private and confidential information on your personal computer. • Always use a firewall. Also, always use one or two anti-spyware programs in addition to your anti-virus software, and keep them up to date • Don't reply to an email or pop-up message that asks for personal or financial information, and don't click on links in the message • Store your information elsewhere apart from your PC like on a flash disk or an external hard drive • Download a safe search tool like SiteAdvisor which will advise
  • 10. IMPACT OF CYBER CRIME • The expansion of internet and computer all over the world has generated a new species of crime commonly known as cyber crimes. The areas most hit by the impact of these crimes is, economy and security regimes because the alarmingly expanding dimensions of cyber frauds and terrorists activities of hardcore terrorists are ruining the nation’s economy and posing a threat to the national security destroying its internal and external peace. • Looking to the international dimensions of these crimes and jurisdictional problems between the countries and variations in the cyber law, the electronic transaction and liability issues for the acts executed in cyberspace still remain hazy and uncertain