SlideShare uma empresa Scribd logo
1 de 18
 Cyber Crime Akash Dolas
“The infectiousness of crime is like that of the plague”.                             Napoleon Bonaparte
 Agenda ,[object Object]
What is cyber crime?
History.
  Profile of cyber criminal.
Victims.
  General Reasons for cyber crime.
Computer crimes are vulnerable.
  Types of cyber crime.
Impact.
  Uncovering Digital Evidence.
  Countries where cyber crime happens.
  Life Cycle of cyber attack.
 How to prevent them.
Data
 Future,[object Object]
What is cyber crime ? “All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system “.

Mais conteúdo relacionado

Mais procurados

Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
 

Mais procurados (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime - What is it ?
Cyber Crime - What is it ?Cyber Crime - What is it ?
Cyber Crime - What is it ?
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Destaque

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Physical fitness components
Physical fitness componentsPhysical fitness components
Physical fitness components
mizrach
 
Top 10 internet uses in teaching and learning
Top 10 internet uses in teaching and learningTop 10 internet uses in teaching and learning
Top 10 internet uses in teaching and learning
djames73583
 

Destaque (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hackers
HackersHackers
Hackers
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
hacker
hackerhacker
hacker
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Physical fitness components
Physical fitness componentsPhysical fitness components
Physical fitness components
 
"One MIL a Day Keeps the (IL) Literate Away"
"One MIL a Day Keeps the (IL) Literate Away""One MIL a Day Keeps the (IL) Literate Away"
"One MIL a Day Keeps the (IL) Literate Away"
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computers as the Third Revolution In Education, Computer as Information and C...
Computers as the Third Revolution In Education, Computer as Information and C...Computers as the Third Revolution In Education, Computer as Information and C...
Computers as the Third Revolution In Education, Computer as Information and C...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Top 10 internet uses in teaching and learning
Top 10 internet uses in teaching and learningTop 10 internet uses in teaching and learning
Top 10 internet uses in teaching and learning
 
Final dep ed physical fitness test
Final dep ed physical fitness testFinal dep ed physical fitness test
Final dep ed physical fitness test
 

Semelhante a Cyber Crime

Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
Waheed Rana
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Semelhante a Cyber Crime (20)

cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
 cyber crime cyber crime
cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 

Cyber Crime