SlideShare a Scribd company logo
1 of 18
Dr B T Sampath Kumar
Professor
Department of Library and Information Science
Tumkur University, Tumakuru, INDIA
www.sampathkumar.info
Cyber Crimes
Cybercrime
• Cybercrime is a crime that involves
a computer and network.
• Cyber crime includes any criminal activity
dealing with computer and Internet.
Cont..
• Recently “The Economic times” published an
article and stated that Bengaluru is India’s
cybercrime capital.
• Bengaluru registered the most number of
cybercrime cases in 2018.
Cont..
• The statistic on Cyber crimes shows that there
are 27,482 cases of Cyber crimes reported in
India in 2019.
• One attack in India every 10 minutes.
• Out of the top 10 most targeted countries by
cyber attackers, India ranks 4th place
Types of cyber crimes
• The different types of cyber crimes are:
– Hacking
– E-mail bombing
– Salami attack
– Email spoofing
– Cyber stalking
– Data diddling
– Denial-of-service attack
– Phishing and spreading of virus.
Hacking
• Computer hacking is the practice of modifying
computer hardware and software.
• Hacking generally refers to unauthorized entry
into a computer or a network.
• A hacker is a person who breaks codes and
passwords to gain unauthorized entry to
computer systems.
E-mail bombing
• E-mail bombing is sending a massive amount
of emails to a specific person or system.
• A huge amount of mail may simply fill up the
recipient's disk space on the server and may
cause the server to stop functioning.
Salami attack
• A “salami attack” is used for the purpose of
committing financial crimes.
• Here criminals steal money or resources a bit
at a time from financial accounts on a system.
Cyberstalking
• Cyber stalking is a crime in which the attacker
teases/threatens a person via e-mail,
WhatsApp, Facebook, Twitter etc.,
• The act of making untrue statements about
another person which damages his/her
reputation is also referred as cyber stalking.
Web jacking
• Web jacking is a process of gaining access and
control over the website of another.
• The information may be manipulated or
changed on the website.
Phishing
• Phishing is an attempt to acquire sensitive
information such as username, password and
credit card details.
Denial-of-service attack
• It is an attempt to make a computer or
network resource unavailable to its intended
users.
• The computer is flooded with more requests
than it can handle which cause it to crash.
• You might have experienced this while
downloading any application form from the
website.
• Even after waiting for several hours the file
will not be downloaded because of the Denial
of service attack
Misleading applications
• Another form of cyber crime is Misleading
applications
• Misleading applications misguide you about
the security status of your computer
• They show you that your computer is infected
by some malware.
Cont..
• You have to download the tool to remove the
threat.
• As you download the tool, it shows some
threats in your computer and to remove it.
• You have to buy the product for which it asks
some personal information like credit card
details etc., which is dangerous.
Adware
• Adware is a software application in which
advertising banners are displayed while any
program is running on your system.
• It can automatically get downloaded to your
system while browsing any website and can be
viewed through pop-up windows.
Spamming
• A most common cyber crime which we face in
the cyber world is Spamming.
• Spamming is a method of flooding the
Internet with copies of the same message.
• They are sent as an unwanted/junk email to
users.
• These spam mails are very irritating as it keeps
coming every day and keeps your mailbox full.
Spywares
• Spyware is a type of program that is installed
without your permission on your personal
computers to collect:
– information about users of the system
– the files in the computer
– your browsing habits
– without your knowledge and send the
information to remote user.
Virus
• Another type of cyber crime is spreading virus
over the Internet.
• Viruses are programs that attach themselves
to a computer or a file and usually affect the
data on a computer, either by altering or
deleting data.

More Related Content

What's hot

Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentationsarahj6
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethicssamina khan
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measuresjoy grace bagui
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Password Cracking
Password CrackingPassword Cracking
Password CrackingSagar Verma
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 

What's hot (20)

Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking
Hacking Hacking
Hacking
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Ppt123
Ppt123Ppt123
Ppt123
 
Ransomware
RansomwareRansomware
Ransomware
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 

Similar to Cyber crimes

Similar to Cyber crimes (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from Dr. B T Sampath Kumar (20)

Selection of scholarly journal in Education
Selection of scholarly journal in EducationSelection of scholarly journal in Education
Selection of scholarly journal in Education
 
Web decay and Internet Archive
Web decay and Internet ArchiveWeb decay and Internet Archive
Web decay and Internet Archive
 
Selection of scholarly journal
Selection of scholarly journal Selection of scholarly journal
Selection of scholarly journal
 
Web browser
Web browserWeb browser
Web browser
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Software
SoftwareSoftware
Software
 
Secondary storage devices
Secondary storage devicesSecondary storage devices
Secondary storage devices
 
Search engine
Search engineSearch engine
Search engine
 
Programming
ProgrammingProgramming
Programming
 
Programming languages
Programming languagesProgramming languages
Programming languages
 
Output devices
Output devicesOutput devices
Output devices
 
Online learning courses
Online learning coursesOnline learning courses
Online learning courses
 
Networks
NetworksNetworks
Networks
 
Network topology
Network topologyNetwork topology
Network topology
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Library networks
Library networksLibrary networks
Library networks
 
Language processors
Language processorsLanguage processors
Language processors
 
Internal storage devices
Internal storage devicesInternal storage devices
Internal storage devices
 
Input devices
Input devicesInput devices
Input devices
 
Information and communication technology
Information and communication technologyInformation and communication technology
Information and communication technology
 

Recently uploaded

VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 

Recently uploaded (20)

VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 

Cyber crimes

  • 1. Dr B T Sampath Kumar Professor Department of Library and Information Science Tumkur University, Tumakuru, INDIA www.sampathkumar.info Cyber Crimes
  • 2. Cybercrime • Cybercrime is a crime that involves a computer and network. • Cyber crime includes any criminal activity dealing with computer and Internet.
  • 3. Cont.. • Recently “The Economic times” published an article and stated that Bengaluru is India’s cybercrime capital. • Bengaluru registered the most number of cybercrime cases in 2018.
  • 4. Cont.. • The statistic on Cyber crimes shows that there are 27,482 cases of Cyber crimes reported in India in 2019. • One attack in India every 10 minutes. • Out of the top 10 most targeted countries by cyber attackers, India ranks 4th place
  • 5. Types of cyber crimes • The different types of cyber crimes are: – Hacking – E-mail bombing – Salami attack – Email spoofing – Cyber stalking – Data diddling – Denial-of-service attack – Phishing and spreading of virus.
  • 6. Hacking • Computer hacking is the practice of modifying computer hardware and software. • Hacking generally refers to unauthorized entry into a computer or a network. • A hacker is a person who breaks codes and passwords to gain unauthorized entry to computer systems.
  • 7. E-mail bombing • E-mail bombing is sending a massive amount of emails to a specific person or system. • A huge amount of mail may simply fill up the recipient's disk space on the server and may cause the server to stop functioning.
  • 8. Salami attack • A “salami attack” is used for the purpose of committing financial crimes. • Here criminals steal money or resources a bit at a time from financial accounts on a system.
  • 9. Cyberstalking • Cyber stalking is a crime in which the attacker teases/threatens a person via e-mail, WhatsApp, Facebook, Twitter etc., • The act of making untrue statements about another person which damages his/her reputation is also referred as cyber stalking.
  • 10. Web jacking • Web jacking is a process of gaining access and control over the website of another. • The information may be manipulated or changed on the website.
  • 11. Phishing • Phishing is an attempt to acquire sensitive information such as username, password and credit card details.
  • 12. Denial-of-service attack • It is an attempt to make a computer or network resource unavailable to its intended users. • The computer is flooded with more requests than it can handle which cause it to crash. • You might have experienced this while downloading any application form from the website. • Even after waiting for several hours the file will not be downloaded because of the Denial of service attack
  • 13. Misleading applications • Another form of cyber crime is Misleading applications • Misleading applications misguide you about the security status of your computer • They show you that your computer is infected by some malware.
  • 14. Cont.. • You have to download the tool to remove the threat. • As you download the tool, it shows some threats in your computer and to remove it. • You have to buy the product for which it asks some personal information like credit card details etc., which is dangerous.
  • 15. Adware • Adware is a software application in which advertising banners are displayed while any program is running on your system. • It can automatically get downloaded to your system while browsing any website and can be viewed through pop-up windows.
  • 16. Spamming • A most common cyber crime which we face in the cyber world is Spamming. • Spamming is a method of flooding the Internet with copies of the same message. • They are sent as an unwanted/junk email to users. • These spam mails are very irritating as it keeps coming every day and keeps your mailbox full.
  • 17. Spywares • Spyware is a type of program that is installed without your permission on your personal computers to collect: – information about users of the system – the files in the computer – your browsing habits – without your knowledge and send the information to remote user.
  • 18. Virus • Another type of cyber crime is spreading virus over the Internet. • Viruses are programs that attach themselves to a computer or a file and usually affect the data on a computer, either by altering or deleting data.