SlideShare a Scribd company logo
1 of 22
CYBER CRIME
Presentation Topic:
Nazish Jamali
OBJECTIVES
After this presentation students will be able to
know:
1. What is cyber crime?
2. How it is occur ?, (define thorough types)
3. How to avoid from it ?
Cyber Crime
Use of computer /internet to
do something that would be a
crime in any case..
• Cyber crimes
• When any crime is committed over
the Internet it is referred to as a
cyber crime.
• When you purchase a home it
comes with a door and lock .you
always ensure that your lock and
doors are working properly . you
may even purchase a security
system.
• Likewise , your system is your home and
security tools are door / locks and security
tools.
• So if someone breaches into your
home’s(system), access all you personal
account and tempers your data , is the
criminal who is committing the crime.
• And committed crime is known as cyber
crime.
• That means we can say that cyber crime is an
illegal activity commotted on the internet.
• Hacking: This is a type of crime wherein a person’s computer
is broken into so that his personal or sensitive information can
be accessed. In hacking, the criminal uses a variety of
software to enter a person’s computer and the person may
not be aware that his computer is being accessed from a
remote location.
• Cyber Stalking: This is a kind of online harassment wherein the
victim is subjected to a barrage of online messages and emails. Typically,
these stalkers know their victims and instead of resorting to offline
stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along
with cyber stalking to make the victims’ lives more miserable.
Email spam and phishing
• Spam is electronic junk mail,
• unwanted messages sent by email, text
message or instant message without the
recipient’s permission
• Spam messages often contain offers of free
goods or prizes, cheap products. You might
be asked to buy something to win a prize or
to call or text a telephone number
Email spam and phishing
• Phishing is a way that criminals trick people into giving
out their personal or financial details.
• Phishing messages often imagine to come from legal
businesses, such as banks or telecommunications
providers.
• Phishing is the practice of attracting users to visit fake
Web sites in order to steal passwords, pin numbers and
other sensitive information.
• Do not respond to phishing messages. If you receive a
phishing message the best thing to do is delete it.
Email spam and phishing
Case study
• Mark is 42 years old and lives in Adelaide. He
receives an email from his bank which says his
internet banking password needs to be
changed. He clicks the link in the email and
resets his password. The next day, he realises
that the email was not actually from his bank.
He checks his account and finds $1000 is
missing.
Identity theft
• When a criminal gains access to your personal
information (such as your name, address, date of birth
or bank account details) to steal money or gain other
benefits.
• They can also use your personal information to create
fake identity in your name
• How does identity theft occur?
• Criminals may attempt to gain your personal
information using a number of different techniques
• Phishing: you may provide personal information over
the phone or internet
Online scam or fraud
• These are false schemes that seek to
take advantage of innocent people to
gain a benefit (such as money, or
access to personal details).
• These are often contained
in spam and phishing messages.
Online scam or fraud
Common types of online scams include:
1. Unexpected prize scams: They inform you that you have won a
prize (e/g. money, shopping vouchers, etc) and to claim it you
are asked to send money or provide personal information.
2. Dating or romance scams
3. Jobs and investment scams: Job scams target people who are
looking for a new job or who want to work from home.
4. Identity theft
• Do not respond to online scams or fraud. If you receive an email
or SMS which looks like a scam, the best thing to do is delete it.
Attacks on computer systems
• unauthorised access or hacking : use your
computer or devices without permission
• malware : malicious software (such as viruses,
trojans and spyware) Criminals may use malicious
software (or malware) to monitor your online
activity and cause damage to the computer.
• Malware is often downloaded when people open
an infected email attachment or click a
mistrustful link in an email.
• Malware can also be used to steal your
usernames, passwords or other information
Tips to avoid cybercrime
• Be social media savvy:
Make sure your social networking profiles (e.g.
Facebook, Twitter, YouTube, MSN, etc.) are set
to private. Check your security settings. Be
careful what information you post online.
Once it is on the Internet, it is extremely
difficult to remove.
Tips to avoid cybercrime
1. Ignore the unwanted messages or e-mails
2. Protect your e-identity (electronic identity)
3. Never store your own details on any mobile device (Secure
mobile devices)
4. If in doubt, block
5. Ignore pop-ups
6. Only shop online on secure sites
7. Different site, different passwords (don’t use same key for
all locks)
8. Lock down your FB account
9. Always make sure that login pages use SSL and that the
login pages starts with https://
CONCLUSION
Technology is negative only in the hands of
people who do not realize that they are one and
the same process as the universe.
Cyber crime ppt

More Related Content

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Phishing
PhishingPhishing
Phishing
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Hacking
Hacking Hacking
Hacking
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 

Similar to Cyber crime ppt

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentationRoel Palmaers
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
Data theft
Data theftData theft
Data theftLaura
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessShwetaSingh713663
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)Dhrumit Patel
 

Similar to Cyber crime ppt (20)

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Data theft
Data theftData theft
Data theft
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber Awareness
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 

More from Nazish Jamali

my Assignment, on browsers | computer
my Assignment, on browsers | computermy Assignment, on browsers | computer
my Assignment, on browsers | computerNazish Jamali
 
Effects of individual difference
Effects of individual differenceEffects of individual difference
Effects of individual differenceNazish Jamali
 
Critical thinking | interogatting the text
Critical thinking | interogatting the textCritical thinking | interogatting the text
Critical thinking | interogatting the textNazish Jamali
 
Foundation of education education role in pakistan
Foundation of education education role in pakistanFoundation of education education role in pakistan
Foundation of education education role in pakistanNazish Jamali
 
Development of eduation first four plans of pakistan
Development of eduation first four plans of pakistanDevelopment of eduation first four plans of pakistan
Development of eduation first four plans of pakistanNazish Jamali
 
Point out nouns from given paragraph | my assignment
Point out nouns from given paragraph | my assignmentPoint out nouns from given paragraph | my assignment
Point out nouns from given paragraph | my assignmentNazish Jamali
 
State of being englis 1 my assignment
State of being englis 1 my assignmentState of being englis 1 my assignment
State of being englis 1 my assignmentNazish Jamali
 
Basic operations of computer my assignment
Basic operations of computer my assignmentBasic operations of computer my assignment
Basic operations of computer my assignmentNazish Jamali
 
Word formation process english content my assignment
Word formation process english content my assignmentWord formation process english content my assignment
Word formation process english content my assignmentNazish Jamali
 
Some topics of Computer
Some topics of ComputerSome topics of Computer
Some topics of ComputerNazish Jamali
 
Effects of school, community and teacher B.Ed (Hons)
Effects of school, community and teacher B.Ed (Hons)Effects of school, community and teacher B.Ed (Hons)
Effects of school, community and teacher B.Ed (Hons)Nazish Jamali
 
Square root in mathematics
Square root in mathematicsSquare root in mathematics
Square root in mathematicsNazish Jamali
 
State of Being, English
State of Being, EnglishState of Being, English
State of Being, EnglishNazish Jamali
 
Proportion and its types, mathematics 8
Proportion and its types, mathematics 8Proportion and its types, mathematics 8
Proportion and its types, mathematics 8Nazish Jamali
 
Exponent, mathematics 7
Exponent, mathematics 7Exponent, mathematics 7
Exponent, mathematics 7Nazish Jamali
 
Interrogating the text , Critical thinking
Interrogating the  text , Critical thinkingInterrogating the  text , Critical thinking
Interrogating the text , Critical thinkingNazish Jamali
 
Individual difference and its effects on learning
Individual difference and its effects on learningIndividual difference and its effects on learning
Individual difference and its effects on learningNazish Jamali
 
General methods, strategy and techniques of teaching
General methods, strategy and techniques of teachingGeneral methods, strategy and techniques of teaching
General methods, strategy and techniques of teachingNazish Jamali
 
decade of development
 decade of development decade of development
decade of developmentNazish Jamali
 

More from Nazish Jamali (20)

my Assignment, on browsers | computer
my Assignment, on browsers | computermy Assignment, on browsers | computer
my Assignment, on browsers | computer
 
Effects of individual difference
Effects of individual differenceEffects of individual difference
Effects of individual difference
 
Critical thinking | interogatting the text
Critical thinking | interogatting the textCritical thinking | interogatting the text
Critical thinking | interogatting the text
 
Foundation of education education role in pakistan
Foundation of education education role in pakistanFoundation of education education role in pakistan
Foundation of education education role in pakistan
 
Development of eduation first four plans of pakistan
Development of eduation first four plans of pakistanDevelopment of eduation first four plans of pakistan
Development of eduation first four plans of pakistan
 
Point out nouns from given paragraph | my assignment
Point out nouns from given paragraph | my assignmentPoint out nouns from given paragraph | my assignment
Point out nouns from given paragraph | my assignment
 
State of being englis 1 my assignment
State of being englis 1 my assignmentState of being englis 1 my assignment
State of being englis 1 my assignment
 
Basic operations of computer my assignment
Basic operations of computer my assignmentBasic operations of computer my assignment
Basic operations of computer my assignment
 
Word formation process english content my assignment
Word formation process english content my assignmentWord formation process english content my assignment
Word formation process english content my assignment
 
Some topics of Computer
Some topics of ComputerSome topics of Computer
Some topics of Computer
 
Effects of school, community and teacher B.Ed (Hons)
Effects of school, community and teacher B.Ed (Hons)Effects of school, community and teacher B.Ed (Hons)
Effects of school, community and teacher B.Ed (Hons)
 
Assessment
AssessmentAssessment
Assessment
 
Square root in mathematics
Square root in mathematicsSquare root in mathematics
Square root in mathematics
 
State of Being, English
State of Being, EnglishState of Being, English
State of Being, English
 
Proportion and its types, mathematics 8
Proportion and its types, mathematics 8Proportion and its types, mathematics 8
Proportion and its types, mathematics 8
 
Exponent, mathematics 7
Exponent, mathematics 7Exponent, mathematics 7
Exponent, mathematics 7
 
Interrogating the text , Critical thinking
Interrogating the  text , Critical thinkingInterrogating the  text , Critical thinking
Interrogating the text , Critical thinking
 
Individual difference and its effects on learning
Individual difference and its effects on learningIndividual difference and its effects on learning
Individual difference and its effects on learning
 
General methods, strategy and techniques of teaching
General methods, strategy and techniques of teachingGeneral methods, strategy and techniques of teaching
General methods, strategy and techniques of teaching
 
decade of development
 decade of development decade of development
decade of development
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Cyber crime ppt

  • 3. OBJECTIVES After this presentation students will be able to know: 1. What is cyber crime? 2. How it is occur ?, (define thorough types) 3. How to avoid from it ?
  • 4.
  • 5.
  • 6. Cyber Crime Use of computer /internet to do something that would be a crime in any case..
  • 7. • Cyber crimes • When any crime is committed over the Internet it is referred to as a cyber crime. • When you purchase a home it comes with a door and lock .you always ensure that your lock and doors are working properly . you may even purchase a security system.
  • 8. • Likewise , your system is your home and security tools are door / locks and security tools. • So if someone breaches into your home’s(system), access all you personal account and tempers your data , is the criminal who is committing the crime. • And committed crime is known as cyber crime. • That means we can say that cyber crime is an illegal activity commotted on the internet.
  • 9. • Hacking: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.
  • 10. • Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.
  • 11.
  • 12. Email spam and phishing • Spam is electronic junk mail, • unwanted messages sent by email, text message or instant message without the recipient’s permission • Spam messages often contain offers of free goods or prizes, cheap products. You might be asked to buy something to win a prize or to call or text a telephone number
  • 13. Email spam and phishing • Phishing is a way that criminals trick people into giving out their personal or financial details. • Phishing messages often imagine to come from legal businesses, such as banks or telecommunications providers. • Phishing is the practice of attracting users to visit fake Web sites in order to steal passwords, pin numbers and other sensitive information. • Do not respond to phishing messages. If you receive a phishing message the best thing to do is delete it.
  • 14. Email spam and phishing Case study • Mark is 42 years old and lives in Adelaide. He receives an email from his bank which says his internet banking password needs to be changed. He clicks the link in the email and resets his password. The next day, he realises that the email was not actually from his bank. He checks his account and finds $1000 is missing.
  • 15. Identity theft • When a criminal gains access to your personal information (such as your name, address, date of birth or bank account details) to steal money or gain other benefits. • They can also use your personal information to create fake identity in your name • How does identity theft occur? • Criminals may attempt to gain your personal information using a number of different techniques • Phishing: you may provide personal information over the phone or internet
  • 16. Online scam or fraud • These are false schemes that seek to take advantage of innocent people to gain a benefit (such as money, or access to personal details). • These are often contained in spam and phishing messages.
  • 17. Online scam or fraud Common types of online scams include: 1. Unexpected prize scams: They inform you that you have won a prize (e/g. money, shopping vouchers, etc) and to claim it you are asked to send money or provide personal information. 2. Dating or romance scams 3. Jobs and investment scams: Job scams target people who are looking for a new job or who want to work from home. 4. Identity theft • Do not respond to online scams or fraud. If you receive an email or SMS which looks like a scam, the best thing to do is delete it.
  • 18. Attacks on computer systems • unauthorised access or hacking : use your computer or devices without permission • malware : malicious software (such as viruses, trojans and spyware) Criminals may use malicious software (or malware) to monitor your online activity and cause damage to the computer. • Malware is often downloaded when people open an infected email attachment or click a mistrustful link in an email. • Malware can also be used to steal your usernames, passwords or other information
  • 19. Tips to avoid cybercrime • Be social media savvy: Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is extremely difficult to remove.
  • 20. Tips to avoid cybercrime 1. Ignore the unwanted messages or e-mails 2. Protect your e-identity (electronic identity) 3. Never store your own details on any mobile device (Secure mobile devices) 4. If in doubt, block 5. Ignore pop-ups 6. Only shop online on secure sites 7. Different site, different passwords (don’t use same key for all locks) 8. Lock down your FB account 9. Always make sure that login pages use SSL and that the login pages starts with https://
  • 21. CONCLUSION Technology is negative only in the hands of people who do not realize that they are one and the same process as the universe.