SlideShare uma empresa Scribd logo
1 de 26
Cyber Terriosim…..
Cybercrime is a term for any illegal activity that uses a computer as
its primary means of commission. The U.S. Department of Justice
expands the definition of cybercrime to include any illegal activity
that uses a computer for the storage of evidence.
What Is Cyber Crime ?
 1. Phishing
 2. Hacking
 3. Stalking and/or
Harassment
 4. Spam
 5.Fraud
 6. Obscene or
offensive content
Phishing is the practice of sending
fraudulent emails in an attempt to
trick the recipient, usually for the
purpose of obtaining money. The
elderly are particularly vulnerable to
these types of cyber crime.
Hacking is similar to digital trespassing.
Hackers infiltrate online networks to
illegally download confidential information,
manipulate functions and in some cases
steal identities that can be used to
fraudulently purchase goods online.
Not all types of cyber crime involve
money. Some cyber criminals use the
Internet as a cover for other illegal
behaviors like stalking, harassment
and in lesser cases, bullying.
Spam, or the unsolicited sending of bulk
email for commercial purposes, is unlawful
in some jurisdictions. While anti-spam laws
are relatively new, limits on unsolicited
electronic communications have existed for
some time.
Computer fraud is any dishonest
misrepresentation of fact
intended to let another to do or
refrain from doing something
which causes loss.
The content of websites and
other electronic communications
may be distasteful, obscene or
offensive for a variety of reasons.
In some instances these
communications may be illegal.
 1. Loss Of Revenue
 2. Wasted Time
 3. Damaged Reputations
 4. Reduced Productivity
One of the main effects of cyber crime on a
company is a loss of revenue. This loss can
be caused by an outside party who obtains
sensitive financial information, using it to
withdraw funds from an organization. It can
also occur when a business's e-commerce
site becomes compromised-while
inoperable, valuable income is lost when
consumers are unable to use the site.
Another major effect or consequence of
cyber crime is the time that is wasted when
IT personnel must devote great portions of
their day handling such incidences. Rather
than working on productive measures for an
organization, many IT staff members spend
a large percentage of their time handling
security breaches and other problems
associated with cyber crime.
In cases where customer records are
compromised by a security breach
associated with cyber crime, a company's
reputation can take a major hit. Customers
whose credit cards or other financial data
become intercepted by hackers or other
infiltrators lose confidence in an
organization and often begin taking their
business elsewhere.
Due to the measures that many companies
must implement to counteract cyber
crime, there is often a negative effect on
employees' productivity. This is
because, due to security
measures, employees must enter more
passwords and perform other time-
consuming acts in order to do their jobs.
Every second wasted performing these tasks
is a second not spent working in a
productive manner.
 1. Ease of Anonymity
 2. Holding a Grudge
 3. Thrill of the Game
Computer crime has risen at an astronomical
rate, in large part due to the ease with which a
perpetrator can remain undetected or
anonymous. It is much easier to get away with
criminal activity in a cyber world than in the
real world. However, the ability to track IP
network addresses is becoming greater all the
time, making it harder to remain invisible
when online. Still, there is a strong sense of
anonymity that can draw otherwise respectable
citizens to abandon their ethics in pursuit of
personal gain.
Malicious computer codes like worms
and viruses are often spread by someone
who is seeking to cause harm to an
individual or company--possibly over
losing a job, perceived unethical business
conduct or maybe even jealousy or envy.
Such parties intend to destroy or cripple
their targets for the personal satisfaction
of seeing them suffer the effects.
For many computer criminals, the excitement
and challenge of exploiting a computer system
can be too great to resist. Computer gurus are
notorious for gleaning information about
specific networks and software designs that
they have an irresistible urge to put to a test.
Unfortunately, much of this information
translates into illegally compromising
computer systems in one way or another. Still,
the lure of "cracking the code" will continue to
be a major factor in enticing some to commit
computer crimes.
1.Be Smart
2.Be Safe
3.Be Cautious
4.Stay Updated
5.Pay Securely
Do not provide personal details online to
people you have never met. This
concept is simple; you do not usually
give your personal information to a
stranger you met on the street. The
same rules apply on the Internet. When
you are required to provide some basic
information ensure that you are doing
so at trusted websites. However, never
reply to emails from unknown senders
asking you for personal information.
Never provide your online banking
information online to anyone.
Protect your computer from hackers
and malware by installing a
firewall, anti-virus software, and anti-
spyware software. Beware of free anti-
spyware software as some of these will
automatically install malware on your
computer. Download these programs
from trusted websites. Keep your anti-
virus software up-to-date by updating
the latest virus definitions regularly.
Check the terms of use when
installing new software on your
computer. Be extra cautious when
installing free software downloaded
from the Internet. Many of these
apparently "free" programs come
with hidden programs that install
malware on your computer without
your knowledge.
Keep your Internet browser up-to-
date. Security threats are discovered
on a daily basis. Always install the
latest version on your computer.
Update your operating system and
other software installed on your
computer with the latest security
patches and updates.
Make online payments only on
website that have an encrypted
connection. Websites that have a
security certificate start with
"https://" and not "http://". You
can verify whether the website is
secure by looking for the small
padlock icon in your browser
window.
Computer crime isn’t victimless. Millions of people lose money to ruthless cyber
criminals every year, and some are actually physically harmed by people they
meet online. When you’re using the Web, remember to stay alert, stay aware and
protect your information.
The threat of cyber crime is real, so act accordingly
Say No To Cyber Crime !!
The End
Thank You
Bushra

Mais conteúdo relacionado

Mais procurados

Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
 

Mais procurados (20)

Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber security
Cyber securityCyber security
Cyber security
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 

Destaque

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROIAWeber
 
Get More Email Subscribers
Get More Email SubscribersGet More Email Subscribers
Get More Email SubscribersAWeber
 
Microsoft word java
Microsoft word   javaMicrosoft word   java
Microsoft word javaRavi Purohit
 
Email List-Building 101: How to Reel In New Readers with a Few Simple Steps
Email List-Building 101: How to Reel In New Readers with a Few Simple StepsEmail List-Building 101: How to Reel In New Readers with a Few Simple Steps
Email List-Building 101: How to Reel In New Readers with a Few Simple StepsAWeber
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimefiza209
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
inflation rate
inflation rate inflation rate
inflation rate Tooba Khan
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesMary Rayme
 
Inflation presented by Tooba
Inflation presented by Tooba Inflation presented by Tooba
Inflation presented by Tooba Tooba Khan
 

Destaque (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI
 
Get More Email Subscribers
Get More Email SubscribersGet More Email Subscribers
Get More Email Subscribers
 
Microsoft word java
Microsoft word   javaMicrosoft word   java
Microsoft word java
 
Email List-Building 101: How to Reel In New Readers with a Few Simple Steps
Email List-Building 101: How to Reel In New Readers with a Few Simple StepsEmail List-Building 101: How to Reel In New Readers with a Few Simple Steps
Email List-Building 101: How to Reel In New Readers with a Few Simple Steps
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Como funcionam as ameaças da internet e o cybercrime
Como funcionam as ameaças da internet e o cybercrimeComo funcionam as ameaças da internet e o cybercrime
Como funcionam as ameaças da internet e o cybercrime
 
inflation rate
inflation rate inflation rate
inflation rate
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
Inflation presented by Tooba
Inflation presented by Tooba Inflation presented by Tooba
Inflation presented by Tooba
 

Semelhante a Cyber crime ppt

Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 

Semelhante a Cyber crime ppt (20)

Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Information security
Information securityInformation security
Information security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Cyber crime ppt

  • 2. Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence. What Is Cyber Crime ?
  • 3.  1. Phishing  2. Hacking  3. Stalking and/or Harassment  4. Spam  5.Fraud  6. Obscene or offensive content
  • 4. Phishing is the practice of sending fraudulent emails in an attempt to trick the recipient, usually for the purpose of obtaining money. The elderly are particularly vulnerable to these types of cyber crime.
  • 5. Hacking is similar to digital trespassing. Hackers infiltrate online networks to illegally download confidential information, manipulate functions and in some cases steal identities that can be used to fraudulently purchase goods online.
  • 6. Not all types of cyber crime involve money. Some cyber criminals use the Internet as a cover for other illegal behaviors like stalking, harassment and in lesser cases, bullying.
  • 7. Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronic communications have existed for some time.
  • 8. Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss.
  • 9. The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be illegal.
  • 10.  1. Loss Of Revenue  2. Wasted Time  3. Damaged Reputations  4. Reduced Productivity
  • 11. One of the main effects of cyber crime on a company is a loss of revenue. This loss can be caused by an outside party who obtains sensitive financial information, using it to withdraw funds from an organization. It can also occur when a business's e-commerce site becomes compromised-while inoperable, valuable income is lost when consumers are unable to use the site.
  • 12. Another major effect or consequence of cyber crime is the time that is wasted when IT personnel must devote great portions of their day handling such incidences. Rather than working on productive measures for an organization, many IT staff members spend a large percentage of their time handling security breaches and other problems associated with cyber crime.
  • 13. In cases where customer records are compromised by a security breach associated with cyber crime, a company's reputation can take a major hit. Customers whose credit cards or other financial data become intercepted by hackers or other infiltrators lose confidence in an organization and often begin taking their business elsewhere.
  • 14. Due to the measures that many companies must implement to counteract cyber crime, there is often a negative effect on employees' productivity. This is because, due to security measures, employees must enter more passwords and perform other time- consuming acts in order to do their jobs. Every second wasted performing these tasks is a second not spent working in a productive manner.
  • 15.  1. Ease of Anonymity  2. Holding a Grudge  3. Thrill of the Game
  • 16. Computer crime has risen at an astronomical rate, in large part due to the ease with which a perpetrator can remain undetected or anonymous. It is much easier to get away with criminal activity in a cyber world than in the real world. However, the ability to track IP network addresses is becoming greater all the time, making it harder to remain invisible when online. Still, there is a strong sense of anonymity that can draw otherwise respectable citizens to abandon their ethics in pursuit of personal gain.
  • 17. Malicious computer codes like worms and viruses are often spread by someone who is seeking to cause harm to an individual or company--possibly over losing a job, perceived unethical business conduct or maybe even jealousy or envy. Such parties intend to destroy or cripple their targets for the personal satisfaction of seeing them suffer the effects.
  • 18. For many computer criminals, the excitement and challenge of exploiting a computer system can be too great to resist. Computer gurus are notorious for gleaning information about specific networks and software designs that they have an irresistible urge to put to a test. Unfortunately, much of this information translates into illegally compromising computer systems in one way or another. Still, the lure of "cracking the code" will continue to be a major factor in enticing some to commit computer crimes.
  • 19. 1.Be Smart 2.Be Safe 3.Be Cautious 4.Stay Updated 5.Pay Securely
  • 20. Do not provide personal details online to people you have never met. This concept is simple; you do not usually give your personal information to a stranger you met on the street. The same rules apply on the Internet. When you are required to provide some basic information ensure that you are doing so at trusted websites. However, never reply to emails from unknown senders asking you for personal information. Never provide your online banking information online to anyone.
  • 21. Protect your computer from hackers and malware by installing a firewall, anti-virus software, and anti- spyware software. Beware of free anti- spyware software as some of these will automatically install malware on your computer. Download these programs from trusted websites. Keep your anti- virus software up-to-date by updating the latest virus definitions regularly.
  • 22. Check the terms of use when installing new software on your computer. Be extra cautious when installing free software downloaded from the Internet. Many of these apparently "free" programs come with hidden programs that install malware on your computer without your knowledge.
  • 23. Keep your Internet browser up-to- date. Security threats are discovered on a daily basis. Always install the latest version on your computer. Update your operating system and other software installed on your computer with the latest security patches and updates.
  • 24. Make online payments only on website that have an encrypted connection. Websites that have a security certificate start with "https://" and not "http://". You can verify whether the website is secure by looking for the small padlock icon in your browser window.
  • 25. Computer crime isn’t victimless. Millions of people lose money to ruthless cyber criminals every year, and some are actually physically harmed by people they meet online. When you’re using the Web, remember to stay alert, stay aware and protect your information. The threat of cyber crime is real, so act accordingly
  • 26. Say No To Cyber Crime !! The End Thank You Bushra