SlideShare a Scribd company logo
1 of 10
Submitted to :-
Nikhar Bhatnagar
Submitted by :-
Anuj Chaturvedi
1
PRESENTATION
ON
“CYBER CRIME
AND
CHILD PRONOGRAPHY”
POORNIMA GROUP OF INSTITUTIONS, JAIPUR
DEPARTMENT OF COMPUTER SCIENCE
POORNIMA GROUP OF INSTITUTIONS
BT-1, BT PARK SITAPURA
JAIPUR (Raj.)-302022
Walkthrough
Introduction
Types of Cyber Crime
Child Pornography
Safety tips
3
INTRODUCTION
Cyber crime refers to any crime that
involves a computer/mobile and a network.
The computer may have been used in the
commission of a crime, or it may be the
target
Cyber crime is an activity done using
computers and internet. We can say that it is
an unlawful acts wherein the computer
either a tool or target or both.
 A total number of 90, 119, 252 and 219 Government websites tracked by
the Indian Computer Emergency Response Team (CERT-In) were hacked
by various hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011
respectively.
Types of Cyber attacks (source- FBI)
 Computer as a Target : using a computer to attack other computers
e.g. Hacking, virus/worms attacks etc.
 Computer as a Weapon : using a computer to commit real world crimes.
e.g. Cyber terrorism, Child pornography etc.
◦ Financial fraud 11%
◦ Cyber threats(Theft of information) 20%
◦ Cyber Warfare 25%
◦ Drug Trafficking 27%
◦ Cyber Terrorism &extortion 71%
◦ Child Pornography 79%
◦ Viruses 85%
The Internet is being highly used
by its abusers to reach and abuse
children sexually, worldwide. As
more homes have access to
internet, more children would be
using the internet and more are the
chances of falling victim to the
aggression of pedophiles.
Writings, pictures, films, etc.
designed to stimulate sexual
excitement
History of Internet Pornography
 February 1993 – The internet is
made public
 March 1993 – The largest child
pornography investigation in
history begins
 1995 – A study is conducted that
said that about 80% of internet
usage is from pornography
How they operate
They operate Pedophiles use false identity to trap
the children , Pedophiles connect children in
various chat rooms which are used by children to
interact with other children.
Cont..
 2004 – China attempts to
ban internet pornography
 2009 – Media Streaming
is improved and
bandwidth costs drop
Use antivirus
software and
insert
firewalls
uninstall
unnecessary
software
maintain
backup and
check
security
settings`
Stay
anonymous -
choose a
genderless
screen name
Queries
10

More Related Content

What's hot (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Online defamation
Online defamationOnline defamation
Online defamation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Pornography
PornographyPornography
Pornography
 

Viewers also liked

2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child PornographyFrederick Lane
 
PPT on Child labor
PPT on Child labor PPT on Child labor
PPT on Child labor Mv Raam
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornographyOmar Jacalne
 
presentation on child labour
presentation on child labourpresentation on child labour
presentation on child labourshahriar786
 
Child labour
Child labourChild labour
Child labourMSIT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
ppt on child labour
ppt on child labourppt on child labour
ppt on child labourAditya Kumar
 

Viewers also liked (12)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography
 
Child labour
Child labourChild labour
Child labour
 
PPT on Child labor
PPT on Child labor PPT on Child labor
PPT on Child labor
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornography
 
presentation on child labour
presentation on child labourpresentation on child labour
presentation on child labour
 
Child labour
Child labourChild labour
Child labour
 
Child labour-child-labour-project
Child labour-child-labour-projectChild labour-child-labour-project
Child labour-child-labour-project
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
ppt on child labour
ppt on child labourppt on child labour
ppt on child labour
 
Child labour presentation
Child labour presentationChild labour presentation
Child labour presentation
 

Similar to ppt on child pornography and cyber crime

Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world? Dipak Parmar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...Lisa Muthukumar
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxVincentAcapen
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptxangellaclarianes1
 

Similar to ppt on child pornography and cyber crime (20)

CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world?
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

ppt on child pornography and cyber crime

  • 1. Submitted to :- Nikhar Bhatnagar Submitted by :- Anuj Chaturvedi 1 PRESENTATION ON “CYBER CRIME AND CHILD PRONOGRAPHY” POORNIMA GROUP OF INSTITUTIONS, JAIPUR DEPARTMENT OF COMPUTER SCIENCE POORNIMA GROUP OF INSTITUTIONS BT-1, BT PARK SITAPURA JAIPUR (Raj.)-302022
  • 2. Walkthrough Introduction Types of Cyber Crime Child Pornography Safety tips
  • 3. 3 INTRODUCTION Cyber crime refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 4.  A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked by various hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively.
  • 5. Types of Cyber attacks (source- FBI)  Computer as a Target : using a computer to attack other computers e.g. Hacking, virus/worms attacks etc.  Computer as a Weapon : using a computer to commit real world crimes. e.g. Cyber terrorism, Child pornography etc. ◦ Financial fraud 11% ◦ Cyber threats(Theft of information) 20% ◦ Cyber Warfare 25% ◦ Drug Trafficking 27% ◦ Cyber Terrorism &extortion 71% ◦ Child Pornography 79% ◦ Viruses 85%
  • 6. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles. Writings, pictures, films, etc. designed to stimulate sexual excitement
  • 7. History of Internet Pornography  February 1993 – The internet is made public  March 1993 – The largest child pornography investigation in history begins  1995 – A study is conducted that said that about 80% of internet usage is from pornography
  • 8. How they operate They operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children. Cont..  2004 – China attempts to ban internet pornography  2009 – Media Streaming is improved and bandwidth costs drop
  • 9. Use antivirus software and insert firewalls uninstall unnecessary software maintain backup and check security settings` Stay anonymous - choose a genderless screen name