際際滷

際際滷Share a Scribd company logo
Topic
Cyber Crime
and
Its Categories.
CYBER CRIME
 An Illegal activity that is related to a computer and any
other network operated device.
 Computer is the main thing to commit an off sense.
 Personal Information, Business trades & other important documents
can be hacked.
Categories
1. Cyber Crime against persons.
2. Cyber Crime against property.
3. Cyber Crime against government.
Types of Cyber Crime
 BOTNETS:
 Network that consists of compromised computers.
 Attackers control them for performing illicit
task. i.e. computer attacking.
 Can also perform other internet crimes like malware
malicious tasks.
 Can be remove using different security tools.
RANSOMWARE
 Known as one of the most detestable
malware
 Enters in the system and encrypts the key.
 Hacker demands a huge ransoms for
getting the private.
IDENTITY THEFT
 Most common type of Cyber Crime.
 Hackers purports other persons for doing fraud
for financial profits.
 When internet is involved, then it is called
Online Identity Theft.
 Major purpose is to steal personal information
of users for financial blackmailing.
Other Types
 DDos Attacks.
Spam.
Phishing.
Social Engineering.
Malvertising.
Prevention from Cyber Crime.
 The prevention of cyber crime is a
straight forward process and
thats why there are many
attacks avoided by just having a
little technical device and
common sense.
System Updating
One of the best way for system security.
Simply install the patches and software
fixes.
Can block many hackers by updating
systems.
Strong Password
 Important part of security.
 Essential feature that protects users
system from hackers.
 Always select a non-guessable password.
 Never use the same password on different
accounts.
Protect Personal Information
 Always use cautions when sharing
personal information.
 Always keep an eye to account & never
replies unknowns.
 Always pay attention to privacy policies.
Security Software
 A need is raised for security software,
now-a-days.
 Essential for basic protection.
 Firewall & Antivirus are the examples.
REGARDS
From : BBA-1
Shaheer Bin Khalid Nouman Riaz

More Related Content

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
Ashok Mankodi
Cyber security
 Cyber security Cyber security
Cyber security
Tanu Basoiya
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
Cybernetic Global Intelligence
Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
MananSharma75241
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
Hadeel Sadiq Obaid
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ankit Ranjan
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
Deepak Kumar
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
yatendrakumar47
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
Cyber Security
Cyber SecurityCyber Security
Cyber Security
rahulbhardwaj312501
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
isc2-hellenic
Cyber security
Cyber security Cyber security
Cyber security
Samidha Gandhi
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
RuchikaSachdeva4
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
Matlab Simulation
Cyber security
 Cyber security Cyber security
Cyber security
Tanu Basoiya
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
Hadeel Sadiq Obaid
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
Deepak Kumar
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
yatendrakumar47
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
isc2-hellenic
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
RuchikaSachdeva4
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
Matlab Simulation

Similar to Cyber crime (20)

Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
RishabhDwivedi70
Seminar ppt.pptx
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
KajalSingh970833
Cyber crime
Cyber crimeCyber crime
Cyber crime
Muhammad Zeeshan Muzaffar
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman1
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
jondon17
Cyber security.pptxelectronic systems, networks, and data from malicious
Cyber security.pptxelectronic systems, networks, and data from maliciousCyber security.pptxelectronic systems, networks, and data from malicious
Cyber security.pptxelectronic systems, networks, and data from malicious
BhimNathTiwari1
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon17
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
Yagnesh Garud
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
Cyber crime
Cyber crimeCyber crime
Cyber crime
Arslan Meher
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AkshayKhade21
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
Cyber Security Concepts, layers of security,
Cyber Security Concepts, layers of security,Cyber Security Concepts, layers of security,
Cyber Security Concepts, layers of security,
Srinivas Kanakala
Cyber security detailed ppt and understand
Cyber security detailed ppt and understandCyber security detailed ppt and understand
Cyber security detailed ppt and understand
docpain605501
Introduction Of Cyber Security in 2024.pptx
Introduction Of Cyber Security in 2024.pptxIntroduction Of Cyber Security in 2024.pptx
Introduction Of Cyber Security in 2024.pptx
shivjohncena789
hgfhvgggggggggggggggggggggggpresent.pptx
hgfhvgggggggggggggggggggggggpresent.pptxhgfhvgggggggggggggggggggggggpresent.pptx
hgfhvgggggggggggggggggggggggpresent.pptx
wellmove2222
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
RishabhDwivedi70
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman1
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
jondon17
Cyber security.pptxelectronic systems, networks, and data from malicious
Cyber security.pptxelectronic systems, networks, and data from maliciousCyber security.pptxelectronic systems, networks, and data from malicious
Cyber security.pptxelectronic systems, networks, and data from malicious
BhimNathTiwari1
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon17
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
Yagnesh Garud
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AkshayKhade21
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
Cyber Security Concepts, layers of security,
Cyber Security Concepts, layers of security,Cyber Security Concepts, layers of security,
Cyber Security Concepts, layers of security,
Srinivas Kanakala
Cyber security detailed ppt and understand
Cyber security detailed ppt and understandCyber security detailed ppt and understand
Cyber security detailed ppt and understand
docpain605501
Introduction Of Cyber Security in 2024.pptx
Introduction Of Cyber Security in 2024.pptxIntroduction Of Cyber Security in 2024.pptx
Introduction Of Cyber Security in 2024.pptx
shivjohncena789
hgfhvgggggggggggggggggggggggpresent.pptx
hgfhvgggggggggggggggggggggggpresent.pptxhgfhvgggggggggggggggggggggggpresent.pptx
hgfhvgggggggggggggggggggggggpresent.pptx
wellmove2222

More from Shaheer Khalid (6)

Nonverbal communication
Nonverbal communicationNonverbal communication
Nonverbal communication
Shaheer Khalid
7 c's of communication
7 c's of communication7 c's of communication
7 c's of communication
Shaheer Khalid
7 tips for conducting an effective interview
7 tips for conducting an effective interview7 tips for conducting an effective interview
7 tips for conducting an effective interview
Shaheer Khalid
Presentation skills
Presentation skillsPresentation skills
Presentation skills
Shaheer Khalid
Kfc detailed presentation
Kfc detailed presentation Kfc detailed presentation
Kfc detailed presentation
Shaheer Khalid
Motivation concepts
Motivation conceptsMotivation concepts
Motivation concepts
Shaheer Khalid
Nonverbal communication
Nonverbal communicationNonverbal communication
Nonverbal communication
Shaheer Khalid
7 c's of communication
7 c's of communication7 c's of communication
7 c's of communication
Shaheer Khalid
7 tips for conducting an effective interview
7 tips for conducting an effective interview7 tips for conducting an effective interview
7 tips for conducting an effective interview
Shaheer Khalid
Presentation skills
Presentation skillsPresentation skills
Presentation skills
Shaheer Khalid
Kfc detailed presentation
Kfc detailed presentation Kfc detailed presentation
Kfc detailed presentation
Shaheer Khalid
Motivation concepts
Motivation conceptsMotivation concepts
Motivation concepts
Shaheer Khalid

Recently uploaded (9)

TANGKI4D MERUPAKAN SLOT GACOR GAMPANG JACKPOT & PENYEDIA ID PRO 2025 TEPERCAYA
TANGKI4D MERUPAKAN SLOT GACOR GAMPANG JACKPOT & PENYEDIA ID PRO 2025 TEPERCAYATANGKI4D MERUPAKAN SLOT GACOR GAMPANG JACKPOT & PENYEDIA ID PRO 2025 TEPERCAYA
TANGKI4D MERUPAKAN SLOT GACOR GAMPANG JACKPOT & PENYEDIA ID PRO 2025 TEPERCAYA
TANGKI4D
Carabao Cup Final Newcastles Tough Task Ahead.docx
Carabao Cup Final Newcastles Tough Task Ahead.docxCarabao Cup Final Newcastles Tough Task Ahead.docx
Carabao Cup Final Newcastles Tough Task Ahead.docx
Eticketing General
Intangibles in Sports Betting: How Pro Bettors Win
Intangibles in Sports Betting: How Pro Bettors WinIntangibles in Sports Betting: How Pro Bettors Win
Intangibles in Sports Betting: How Pro Bettors Win
Joe Duffy
DetailedBudget1.pdf.....................
DetailedBudget1.pdf.....................DetailedBudget1.pdf.....................
DetailedBudget1.pdf.....................
mekhilivingston
Unlocking Opportunities for Talented Athletes.pdf
Unlocking Opportunities for Talented Athletes.pdfUnlocking Opportunities for Talented Athletes.pdf
Unlocking Opportunities for Talented Athletes.pdf
jinny kaur
San Francisco Giants Rookie & Young Stars game_.pdf
San Francisco Giants Rookie & Young Stars game_.pdfSan Francisco Giants Rookie & Young Stars game_.pdf
San Francisco Giants Rookie & Young Stars game_.pdf
drrichard7
Bethpage Black, A Golfers Paradise....pdf
Bethpage Black, A Golfers Paradise....pdfBethpage Black, A Golfers Paradise....pdf
Bethpage Black, A Golfers Paradise....pdf
Sebastian Wyczawski
Golf, A Timeless Pursuit of Precision.pdf
Golf, A Timeless Pursuit of Precision.pdfGolf, A Timeless Pursuit of Precision.pdf
Golf, A Timeless Pursuit of Precision.pdf
Sebastian Wyczawski
Hockey India: A Story of Pride, Passion, and Perseverance"
Hockey India: A Story of Pride, Passion, and Perseverance"Hockey India: A Story of Pride, Passion, and Perseverance"
Hockey India: A Story of Pride, Passion, and Perseverance"
Gayatri Patel
TANGKI4D MERUPAKAN SLOT GACOR GAMPANG JACKPOT & PENYEDIA ID PRO 2025 TEPERCAYA
TANGKI4D MERUPAKAN SLOT GACOR GAMPANG JACKPOT & PENYEDIA ID PRO 2025 TEPERCAYATANGKI4D MERUPAKAN SLOT GACOR GAMPANG JACKPOT & PENYEDIA ID PRO 2025 TEPERCAYA
TANGKI4D MERUPAKAN SLOT GACOR GAMPANG JACKPOT & PENYEDIA ID PRO 2025 TEPERCAYA
TANGKI4D
Carabao Cup Final Newcastles Tough Task Ahead.docx
Carabao Cup Final Newcastles Tough Task Ahead.docxCarabao Cup Final Newcastles Tough Task Ahead.docx
Carabao Cup Final Newcastles Tough Task Ahead.docx
Eticketing General
Intangibles in Sports Betting: How Pro Bettors Win
Intangibles in Sports Betting: How Pro Bettors WinIntangibles in Sports Betting: How Pro Bettors Win
Intangibles in Sports Betting: How Pro Bettors Win
Joe Duffy
DetailedBudget1.pdf.....................
DetailedBudget1.pdf.....................DetailedBudget1.pdf.....................
DetailedBudget1.pdf.....................
mekhilivingston
Unlocking Opportunities for Talented Athletes.pdf
Unlocking Opportunities for Talented Athletes.pdfUnlocking Opportunities for Talented Athletes.pdf
Unlocking Opportunities for Talented Athletes.pdf
jinny kaur
San Francisco Giants Rookie & Young Stars game_.pdf
San Francisco Giants Rookie & Young Stars game_.pdfSan Francisco Giants Rookie & Young Stars game_.pdf
San Francisco Giants Rookie & Young Stars game_.pdf
drrichard7
Bethpage Black, A Golfers Paradise....pdf
Bethpage Black, A Golfers Paradise....pdfBethpage Black, A Golfers Paradise....pdf
Bethpage Black, A Golfers Paradise....pdf
Sebastian Wyczawski
Golf, A Timeless Pursuit of Precision.pdf
Golf, A Timeless Pursuit of Precision.pdfGolf, A Timeless Pursuit of Precision.pdf
Golf, A Timeless Pursuit of Precision.pdf
Sebastian Wyczawski
Hockey India: A Story of Pride, Passion, and Perseverance"
Hockey India: A Story of Pride, Passion, and Perseverance"Hockey India: A Story of Pride, Passion, and Perseverance"
Hockey India: A Story of Pride, Passion, and Perseverance"
Gayatri Patel

Cyber crime

  • 2. CYBER CRIME An Illegal activity that is related to a computer and any other network operated device. Computer is the main thing to commit an off sense. Personal Information, Business trades & other important documents can be hacked. Categories 1. Cyber Crime against persons. 2. Cyber Crime against property. 3. Cyber Crime against government.
  • 3. Types of Cyber Crime BOTNETS: Network that consists of compromised computers. Attackers control them for performing illicit task. i.e. computer attacking. Can also perform other internet crimes like malware malicious tasks. Can be remove using different security tools.
  • 4. RANSOMWARE Known as one of the most detestable malware Enters in the system and encrypts the key. Hacker demands a huge ransoms for getting the private.
  • 5. IDENTITY THEFT Most common type of Cyber Crime. Hackers purports other persons for doing fraud for financial profits. When internet is involved, then it is called Online Identity Theft. Major purpose is to steal personal information of users for financial blackmailing.
  • 6. Other Types DDos Attacks. Spam. Phishing. Social Engineering. Malvertising.
  • 7. Prevention from Cyber Crime. The prevention of cyber crime is a straight forward process and thats why there are many attacks avoided by just having a little technical device and common sense.
  • 8. System Updating One of the best way for system security. Simply install the patches and software fixes. Can block many hackers by updating systems.
  • 9. Strong Password Important part of security. Essential feature that protects users system from hackers. Always select a non-guessable password. Never use the same password on different accounts.
  • 10. Protect Personal Information Always use cautions when sharing personal information. Always keep an eye to account & never replies unknowns. Always pay attention to privacy policies.
  • 11. Security Software A need is raised for security software, now-a-days. Essential for basic protection. Firewall & Antivirus are the examples.
  • 12. REGARDS From : BBA-1 Shaheer Bin Khalid Nouman Riaz