SlideShare a Scribd company logo
1 of 14
CYBER CRIME
FOR EVERY LOCK,THERE IS SOMEONE OUT
THERE TRYING TO PICK IT OR BREAK IN
CONTENTS
N
INTRODUCTION
TYPES OF CYBERCRIMES
HISTORY OF CYBER
CRIMES
O
HOW TO PREVENT CYBER CRIMES
CYBER FACTS
CONCLUSION
R
CONTENTS
CONTENTS
HOW TO PREVENT CYBER CRIMES?
INTRODUCTION
Cyber crime refers to any crime that involves
computer/mobile and network.
The founding fathers of internet, don’t get that it may
be misused.
Today , there are many disturbing things happening
in cyberspace.
O
CYBER CRIMES IN INDIA
HOW TO PREVENT CYBER CRIMES
CYBER FACTS
CONCLUSION
S
R
S
A
HISTORY OF CYBERCRIMES
From the 1940s
to present,
discover how
cybercrime and
cyber security
have developed
to became what
we know today
O
CYBER CRIMES IN INDIA
HOW TO PREVENT CYBER CRIMES
CYBER FACTS
CONCLUSION
S
R
S
A
HISTORY OF CYBERCRIMES
FROM THE 1940S TO PRESENT
DISCOVER NOW CYBERCRIME AND
CYBERSECURITY HAVE DEVELOPED TO
BECAME WHAT WE KNOW TODAY.
1940 -THE TIME BEFORE CRIME
1950- THE PHONE PHREAKS
1960-ALL QUIET ON THE WESTERN
FRONT
1970- COMPUTER SECURITY OR
BORN
1980-FROM ARPANET TO INTERNET
1990- THE WORDS GOES ONLINE
2000- THREATS DIVERSITY AND
MULTIPLY 2010 THE NEXT
GENERATION
2010 -538 MILLION USERS
INFORMATION IS STOLEN FROM SINA
WEIBO
A CRIME IS DEFINED AS ANY ACT
THAT IS CONTRARY TO LEGAL CODE
OR LAWS.
THERE ARE 7 TYPES OF
CRIMES
• CRIMES AGAINST PERSONS
• CRIMES AGAINST PROPERTY
• HATE CRIMES
• CRIMES AGAINST MORALITY
• WHITE-COLLAR CRIME
• ORGANIZED CRIME
• SOCIOLOGICAL LOOK AT CRIME
TYPES OF CYBERCRIME ?
O
CYBER CRIMES IN INDIA
HOW TO PREVENT CYBER CRIMES
CYBER FACTS
CONCLUSION
S
R
S
A
HOW TO PREVENT
CYBERCRIME
PREVENTING CRIME TAKES
EACH INDIVIDUAL PERSON
BEING RESPONSIBLE FOR
THEIR OWN SAFETY AND
MAKING WISE CHOICES.
CRIME STOPPERS IS A
PROGRAM IN WHICH MEMBER
OF THE COMMUNITY, THE
MEDIA, LAW ENFORCEMENT
AGENCIES AND BUSINESSES
WORK TOGETHER TO SOLVE
CRIMES.
• HEALTHCARE ORGANIZATI
O-NS ARE THE NUMBER
ONE CYBER ATTACKED
INDUSTRY
• THERE ARE
CYBERCRIMINALS ON THE
FBI’S MOST WANTED LIST
• AS OF MAY 2016, 600,000
FACEBOOK ACCOUNTS
WERE COMPROMISED
EVERY DAY
CYBER FACTS 001
CYBER CRIME
RATE IN INDIA
BY- SUSHMITHA
AND SHALINI
O
HOW TO PREVENT CYBER CRIMES
RISK OF CYBERCRIME IS SIGNIFICANT
AND INCREASING GRADUALLY.
MUST BE CONSIDERED BY BOARDS AS
PART OF THEIR MANAGEMENT
RESPONSIBILITIES.
PROACTIVE AND PROPORTIONAL
RESPONSE ,BASED ON CYBERCRIME
RISK ASSESSMENT
CONCLUSION
BY- SUSHMITHA & SHAALINI
11-C

More Related Content

What's hot

SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
Asish Verma
 

What's hot (20)

SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
it act
it actit act
it act
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
cyber crime
cyber crimecyber crime
cyber crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Similar to Cyber crime.ppt

cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
sainnrg
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 

Similar to Cyber crime.ppt (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
6 strategies to protect yourself from cyber attack
6 strategies to protect yourself from cyber attack6 strategies to protect yourself from cyber attack
6 strategies to protect yourself from cyber attack
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 

More from SushmithaR26 (6)

computer networks ppt.pptx
computer networks ppt.pptxcomputer networks ppt.pptx
computer networks ppt.pptx
 
PHYSICS PRACTICAL PROJECT.pptx
PHYSICS PRACTICAL PROJECT.pptxPHYSICS PRACTICAL PROJECT.pptx
PHYSICS PRACTICAL PROJECT.pptx
 
CHEMISTRY PRATICAL PROJECT.pptx
CHEMISTRY PRATICAL PROJECT.pptxCHEMISTRY PRATICAL PROJECT.pptx
CHEMISTRY PRATICAL PROJECT.pptx
 
Flow of execution.pptx
Flow of execution.pptxFlow of execution.pptx
Flow of execution.pptx
 
Chemistry investigatory project
Chemistry investigatory projectChemistry investigatory project
Chemistry investigatory project
 
Physics ppt
Physics pptPhysics ppt
Physics ppt
 

Recently uploaded

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Recently uploaded (20)

Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 

Cyber crime.ppt

  • 1. CYBER CRIME FOR EVERY LOCK,THERE IS SOMEONE OUT THERE TRYING TO PICK IT OR BREAK IN
  • 3. O HOW TO PREVENT CYBER CRIMES CYBER FACTS CONCLUSION R CONTENTS CONTENTS HOW TO PREVENT CYBER CRIMES?
  • 4. INTRODUCTION Cyber crime refers to any crime that involves computer/mobile and network. The founding fathers of internet, don’t get that it may be misused. Today , there are many disturbing things happening in cyberspace.
  • 5. O CYBER CRIMES IN INDIA HOW TO PREVENT CYBER CRIMES CYBER FACTS CONCLUSION S R S A HISTORY OF CYBERCRIMES From the 1940s to present, discover how cybercrime and cyber security have developed to became what we know today
  • 6. O CYBER CRIMES IN INDIA HOW TO PREVENT CYBER CRIMES CYBER FACTS CONCLUSION S R S A HISTORY OF CYBERCRIMES FROM THE 1940S TO PRESENT DISCOVER NOW CYBERCRIME AND CYBERSECURITY HAVE DEVELOPED TO BECAME WHAT WE KNOW TODAY. 1940 -THE TIME BEFORE CRIME 1950- THE PHONE PHREAKS 1960-ALL QUIET ON THE WESTERN FRONT 1970- COMPUTER SECURITY OR BORN 1980-FROM ARPANET TO INTERNET 1990- THE WORDS GOES ONLINE 2000- THREATS DIVERSITY AND MULTIPLY 2010 THE NEXT GENERATION 2010 -538 MILLION USERS INFORMATION IS STOLEN FROM SINA WEIBO
  • 7. A CRIME IS DEFINED AS ANY ACT THAT IS CONTRARY TO LEGAL CODE OR LAWS. THERE ARE 7 TYPES OF CRIMES • CRIMES AGAINST PERSONS • CRIMES AGAINST PROPERTY • HATE CRIMES • CRIMES AGAINST MORALITY • WHITE-COLLAR CRIME • ORGANIZED CRIME • SOCIOLOGICAL LOOK AT CRIME TYPES OF CYBERCRIME ?
  • 8. O CYBER CRIMES IN INDIA HOW TO PREVENT CYBER CRIMES CYBER FACTS CONCLUSION S R S A HOW TO PREVENT CYBERCRIME PREVENTING CRIME TAKES EACH INDIVIDUAL PERSON BEING RESPONSIBLE FOR THEIR OWN SAFETY AND MAKING WISE CHOICES. CRIME STOPPERS IS A PROGRAM IN WHICH MEMBER OF THE COMMUNITY, THE MEDIA, LAW ENFORCEMENT AGENCIES AND BUSINESSES WORK TOGETHER TO SOLVE CRIMES.
  • 9. • HEALTHCARE ORGANIZATI O-NS ARE THE NUMBER ONE CYBER ATTACKED INDUSTRY • THERE ARE CYBERCRIMINALS ON THE FBI’S MOST WANTED LIST • AS OF MAY 2016, 600,000 FACEBOOK ACCOUNTS WERE COMPROMISED EVERY DAY CYBER FACTS 001
  • 12.
  • 13. O HOW TO PREVENT CYBER CRIMES RISK OF CYBERCRIME IS SIGNIFICANT AND INCREASING GRADUALLY. MUST BE CONSIDERED BY BOARDS AS PART OF THEIR MANAGEMENT RESPONSIBILITIES. PROACTIVE AND PROPORTIONAL RESPONSE ,BASED ON CYBERCRIME RISK ASSESSMENT CONCLUSION
  • 14. BY- SUSHMITHA & SHAALINI 11-C