SlideShare uma empresa Scribd logo
1 de 17
Submitted By:
Bhoopesh Chaudhary
Vipin Rawat
Prateek Kumar
Mukul Saini
Ishaan Asthana
Presentation on Cyber
Crime
Content
 Introduction
 What is Cyber Crime
 Evolution of Cyber Attacks
 History of cyber crime
 Types of cyber crime
 Categories of cyber crime
 Top 5 Cyber Crimes
 Prevention
 Conclusion
Introduction
 The internet in India is growing rapidly. It has given rise
to new opportunities in every field we can think of be it
entertainment, business, sports or education.
 There are two sides to a coin. Internet also has its own
disadvantages. One of the major disadvantages is Cyber
crime i.e illegal activity committed on the internet.
 Cyber crime is not an old sort of crime to the world. It is
defined as any criminal activity which takes place on or
over the medium of computers or internet or other
technology recognized by the Information Technology
Act.
What is Cybercrime
 Cybercrime is any illegal act committed using a
computer network (especially the Internet).
 Cybercrime is a subset of computer crime.
 Cyber crime is the most prevalent crime playing a
devastating role in Modern India. Not only the criminals
are causing enormous losses to the society and the
government but are also able to conceal their identity to
a great extent.
Evolution of Cyber Attacks
 In the last quarter-century alone, cyber-attacks have evolved from
tiny hacks developed by high school students to state-sponsored
attacks that compromised the presidential election.
 With the advent of the 2000s and the mass adoption of applications
by the digital world, we have entered a new era of cyber threats that
focus on exploiting vulnerabilities in these applications.
 Beginning in 2010 large organizations began hiring more
cybersecurity experts to counter the risk of cyber threats, as the
sense of supposed digital security evaporated.
 2016 has seen an increase in multi-vector attacks, which are largely
state-sponsored and therefore have the potential to attract a lot of
attention. These kinds of attacks happen to be the most destructive,
as hackers develop tools to attack anything and everything digital.
History
 The first recorded cyber crime took place in the year
1820.
 In 1820, Joseph-Marie Jacquard, a textile manufacturer
in France, produced the loom. This device allowed the
repetition of a series of steps in the weaving of special
fabrics.
 This resulted in a fear amongst Jacquard‘s employees
that their traditional employment and livelihood were
being threatened.
 They committed acts of sabotage to discourage Jacquard
from further use of the new technology. This is the first
recorded cyber crime.
Types of Cyber Crime
 Hacking
 Denial OF Service Attack
 Virus Dissemination
 Computer Forgery
 Credit Card Fraud
 Phishing
 Spoofing
 Cyber Stalking
 Threatening
 Salami attack
Modification of a conventional
crime by using computers
 Financial crimes
 Sale of illegal articles
 Online gambling
 Intellectual Property crime
 Email spoofing
 Forgery
 Cyber Defamation
 Cyber stalking
Cyber crime Categories
 Cybercrime is a broad term that is used to define
criminal activity where a computer or computer
network is a tool, target, or location of criminal
activity, including computers themselves. The term
is a generic term that includes crimes such as the
abduction of children by chatroom scams
 Cyber crime major categories are as follows:
1) Cyber crime against persons.
2) Cyber crime against property.
3) Cyber crime against government.
First Category
 Cyber harassment is a distinct Cybercrime. Various kinds of
harassment can and do occur in cyberspace, or through the use of
cyberspace. Harassment can be sexual, racial, religious, or other.
 Particular attention has been paid to the use of cybercrime as a tool
for organized crime groups such as drug traffics and money
laundering. This type of crime includes the use of virtual currencies
such as Bitcoin, Litecoin, Bitcoin Cash, Monero, and Ethereum.
 The spread of the Internet in daily life has made online harassment a
major threat to the safety and well-being of many people. Online
harassment can include threatening e-mails, threats of physical
violence, or posting information on the Internet. Cyberbullying,
online predatory, cyberstalking, Internet trolling, propagation of
illegal obscene, or offensive content, including harassment and
threats are considered as online harassment.
Second Category
 These crimes include computer vandalism(destruction of others'
property), transmission of harmful programs, unauthorized
trespassing through cyber space, unauthorized possession of
computer information.
 Cybercrime is a criminal activity that involves computers,
networked devices, and networks. This is done by infecting
computers with computer viruses that spread to other computers in a
network, such as networks, servers, and other computer systems. A
computer as a target means an illegal act in which the main target is
a computer or network. DDoS attacks and malware are considered
as computers as targets.
 Computer as a tool crime is categorized when the individuals are the
primary targets. For such cyber crimes, relatively less technical
expertise is needed. Some computers as a tool for cyber attacks are
identity theft, phishing scams, and spam.
Third Category
 Cyber terrorism is one distinct kind of crime in
this category.
 Crimes against the government (accessing
confidential information, cyber warfare, pirated
software).
 The growth of internet has shown that the
medium of Cyberspace is being used by
individuals and groups to threaten the
international governments as also to terrorize the
citizens of a country.
Top 5 Cyber Crimes
 Phishing Scams.
 Website Spoofing.
 Ransomware.
 Malware.
 IOT Hacking
PREVENTION OF CYBER CRIME
 Avoid disclosing your identity to any strangers.
 Always use latest antivirus software to guard
against virus attacks.
 Never send your credit card number to any site
which is not secured.
 Use of firewall
 Change passwords frequently
 Uninstall unnecessary software
Conclusion
 Within the law enforcement agencies, a set of
rules must be developed to address the various
categories of computer crime.
 As such, investigators will know what and
which materials to search and seize, the
electronic evidence to recover, and the chain of
custody to maintain .
Reference
 www.google.com
 www.wikipedia.com
 www.studymafia.org
Thanks

Mais conteúdo relacionado

Semelhante a CLE-Cyber crimes.pptx

Semelhante a CLE-Cyber crimes.pptx (18)

111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Internet
InternetInternet
Internet
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Último

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Último (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

CLE-Cyber crimes.pptx

  • 1. Submitted By: Bhoopesh Chaudhary Vipin Rawat Prateek Kumar Mukul Saini Ishaan Asthana Presentation on Cyber Crime
  • 2. Content  Introduction  What is Cyber Crime  Evolution of Cyber Attacks  History of cyber crime  Types of cyber crime  Categories of cyber crime  Top 5 Cyber Crimes  Prevention  Conclusion
  • 3. Introduction  The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.  There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime i.e illegal activity committed on the internet.  Cyber crime is not an old sort of crime to the world. It is defined as any criminal activity which takes place on or over the medium of computers or internet or other technology recognized by the Information Technology Act.
  • 4. What is Cybercrime  Cybercrime is any illegal act committed using a computer network (especially the Internet).  Cybercrime is a subset of computer crime.  Cyber crime is the most prevalent crime playing a devastating role in Modern India. Not only the criminals are causing enormous losses to the society and the government but are also able to conceal their identity to a great extent.
  • 5. Evolution of Cyber Attacks  In the last quarter-century alone, cyber-attacks have evolved from tiny hacks developed by high school students to state-sponsored attacks that compromised the presidential election.  With the advent of the 2000s and the mass adoption of applications by the digital world, we have entered a new era of cyber threats that focus on exploiting vulnerabilities in these applications.  Beginning in 2010 large organizations began hiring more cybersecurity experts to counter the risk of cyber threats, as the sense of supposed digital security evaporated.  2016 has seen an increase in multi-vector attacks, which are largely state-sponsored and therefore have the potential to attract a lot of attention. These kinds of attacks happen to be the most destructive, as hackers develop tools to attack anything and everything digital.
  • 6. History  The first recorded cyber crime took place in the year 1820.  In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics.  This resulted in a fear amongst Jacquard‘s employees that their traditional employment and livelihood were being threatened.  They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime.
  • 7. Types of Cyber Crime  Hacking  Denial OF Service Attack  Virus Dissemination  Computer Forgery  Credit Card Fraud  Phishing  Spoofing  Cyber Stalking  Threatening  Salami attack
  • 8. Modification of a conventional crime by using computers  Financial crimes  Sale of illegal articles  Online gambling  Intellectual Property crime  Email spoofing  Forgery  Cyber Defamation  Cyber stalking
  • 9. Cyber crime Categories  Cybercrime is a broad term that is used to define criminal activity where a computer or computer network is a tool, target, or location of criminal activity, including computers themselves. The term is a generic term that includes crimes such as the abduction of children by chatroom scams  Cyber crime major categories are as follows: 1) Cyber crime against persons. 2) Cyber crime against property. 3) Cyber crime against government.
  • 10. First Category  Cyber harassment is a distinct Cybercrime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.  Particular attention has been paid to the use of cybercrime as a tool for organized crime groups such as drug traffics and money laundering. This type of crime includes the use of virtual currencies such as Bitcoin, Litecoin, Bitcoin Cash, Monero, and Ethereum.  The spread of the Internet in daily life has made online harassment a major threat to the safety and well-being of many people. Online harassment can include threatening e-mails, threats of physical violence, or posting information on the Internet. Cyberbullying, online predatory, cyberstalking, Internet trolling, propagation of illegal obscene, or offensive content, including harassment and threats are considered as online harassment.
  • 11. Second Category  These crimes include computer vandalism(destruction of others' property), transmission of harmful programs, unauthorized trespassing through cyber space, unauthorized possession of computer information.  Cybercrime is a criminal activity that involves computers, networked devices, and networks. This is done by infecting computers with computer viruses that spread to other computers in a network, such as networks, servers, and other computer systems. A computer as a target means an illegal act in which the main target is a computer or network. DDoS attacks and malware are considered as computers as targets.  Computer as a tool crime is categorized when the individuals are the primary targets. For such cyber crimes, relatively less technical expertise is needed. Some computers as a tool for cyber attacks are identity theft, phishing scams, and spam.
  • 12. Third Category  Cyber terrorism is one distinct kind of crime in this category.  Crimes against the government (accessing confidential information, cyber warfare, pirated software).  The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
  • 13. Top 5 Cyber Crimes  Phishing Scams.  Website Spoofing.  Ransomware.  Malware.  IOT Hacking
  • 14. PREVENTION OF CYBER CRIME  Avoid disclosing your identity to any strangers.  Always use latest antivirus software to guard against virus attacks.  Never send your credit card number to any site which is not secured.  Use of firewall  Change passwords frequently  Uninstall unnecessary software
  • 15. Conclusion  Within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime.  As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain .