logging in or signing up Cyber Crime piratebhai Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Copy Does not support media & animations WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 725 Category: Education License: All Rights Reserved Like it (0) Dislike it (0) Added: December 12, 2011 This Presentation is Public Favorites: 3 Presentation Description dont get into the trap Comments Posting comment... Premium member Presentation Transcript PowerPoint Presentation: Presented By The Pirate CYBER CRIME Introduction: Introduction Cyber Crime is also known as E-Crime, Hi-Tech Crime or Electronic Crime is where the computer is the target of a crime. An illegal work in which Computer & Internet is involved. Introduction: Introduction Current approaches evolved to deal with real-world crime Cybercrime occurs in a virtual-world and therefore presents different issuesTYPES OF CYBER CRIME: TYPES OF CYBER CRIME Unauthorized Access (Hacking) Email Bombing (Denial of Service attack) Cyber Pornography Salami Attack Virus / Worm Attack Software Piracy Phising (Email spoofing)Phising (Email spoofing): Phising (Email spoofing) From: *****Bank [mailto: support@****Bank.com] Subject: Official Information from **** Bank Dear Customer! For security purposes you’re a/c has been randomly chosen for verification. To verify you’re a/c information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify you’re a/c details. https://www.infinity.*****bank.co.in/Verify.jspCREDIT CARD SKIMMER: CREDIT CARD SKIMMERCALL FORGING: CALL FORGINGPowerPoint Presentation: Arms Act Online sale of Arms Sec. 383 IPC Web Jacking NDPS Act Online sale of Drugs Sec 416, 417, 463 IPC Email spoofing Sec 420 IPC Bogus websites, cyber frauds Sec 463, 470, 471 IPC Forgery of electronic records Sec 499, 500 IPC Sending defamatory messages by email Sec 503 IPC Sending threatening messages by email Computer Related Crimes under IPC and Special Laws 8WHAT WE SHOULD DO??: WHAT WE SHOULD DO?? Never give your personal info in public. Never Configure WIFI Router as Unsecured Connection. Maintain All types of Logs for at least 6 months. Contact your local police. Mail: firstname.lastname@example.orgREFERENCES: REFERENCES http://www.google.com http://www.sunnywaghela.com http://www.techdefence.comPowerPoint Presentation: Think before you Click “THANK YOU!!!!” You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.