Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

PRACTICUM

EDU 103: DEVELOPMENT AND RESOURCES I


N EDUCATIONAL TECHNOLOGY.

Submitted By
Irein K M
No:09
1st year B.Ed English
SJB College of Education
Nedukunnam.
MICROSOFT
POWERPOINT PRESENTATION
WELCOME
TOPIC

CYBER CRIME
INTRODUCTION
The internet in India is growing rapidly. It has given rise to
new opportunities in every field. We can think of be it
entertainment, business, sports or education sector.

Therere two sides of a coin. Internet also has its own


disadvantages is cyber Crime-illegal activity committed on
the internet.
DEFINING CYBER CRIME
Crime committed using a computer and the internet to steal
data or information.
Illegal imports.
Malicious programs.
HISTORY
The first recorded cyber crime took place in the year 1820.
CATEGORIES OF
CYBER CRIMES
Hacking
Stalking
Phishing
Cyber Terrorism
Virus Dissemination
Child abusion and Sex racketing
What is Hacking?
Hacking is identifying weakness
in computer systems or networks
to exploit its weaknesses to gain
access. Example of Hacking:
Using password cracking
algorithm to gain access to a
system.
Hacking means using computers
to commit fraudulent acts such as
fraud, privacy invasion, stealing
corporate/personal data, etc.
Cyber crimes cost many
organizations millions of dollars
every year.
Types of Hackers
What is Cyberstalking?
Cyberstalking is the use of the
Internet or other electronic means
to stalk or harass an individual,
group, or organization.
It may include false accusations,
defamation, slander and libel. It
may also include monitoring,
identity theft, threats, vandalism,
solicitation for sex, or gathering
information that may be used to
threaten, embarrass or harass.
What is Phishing?
Phishing is the attempt to
obtain sensitive information
such as usernames,
passwords, and credit card
details (and, indirectly,
money), often for malicious
reasons, by disguising as a
trustworthy entity in an
electronic communication.
Phishing is an example of
social engineering techniques
used to deceive users, and
exploits weaknesses in
current web security
Cyberterrorism
Cyberterrorism is the use of the Internet to conduct violent acts that result in or
threaten the loss of life or significant bodily harm in order to achieve political
gains through intimidation.
It is also sometimes considered the act of Internet terrorism in terrorist
activities, including acts of deliberate, large-scale disruption of computer
networks, especially of personal computers attached to the Internet, by the
means of tools such as computer viruses.
Virus Dissemination
Dissemination takes on the theory of the traditional view of
communication, which involves a sender and receiver. The traditional
communication view point is broken down into a sender sending
information, and receiver collecting the information processing it and
sending information back, like a telephone line.
Child abusion and
Sex racketing
Child abuse or child maltreatment is
physical, sexual, or psychological
mistreatment or neglect of a child or
children, especially by a parent or
other caregiver.

It may include any act or failure to act


by a parent or other caregiver that
results in actual or potential harm to a
child, and can occur in a child's home,
or in the organizations, schools or
communities the child interacts with.
Conclusion
Technology is destructive only in the hands of people who
do not realize that they are one and the same process as the
universe.

You might also like