SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
What is Cybercrime?
 Cybercrime or computer crime is any crime that
involves a computer and a network.
 The computer used in the commission of a crime
or may be the target.
 Both governmental and non-state actors engage
in cybercrimes.
 annual damage to the global economy is at $445
billion.
Types of Cybercrimes
 Hacking: a person’s computer is broken into so
that his personal or sensitive information can be
accessed .
 Theft: This crime occurs when a person violates
copyrights and downloads music, movies, games
and software.
 Cyber Stalking: Online harassment wherein the
victim is subjected to a barrage of online messages
and emails.
Types of Cybercrimes
 Identity Theft : a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card
and other sensitive information .
 Malicious Software :These are Internet-based software
or programs that are used to disrupt a network.
 Child soliciting and Abuse :cyber crime wherein
criminals solicit minors via chat rooms for the purpose
of child pornography.
Causes of Cybercrime
 Economy : perception of low risk and very high
financial reward.
 Ideology :perceived ethical, ideological or moral
reasons.
 Structural causes :the environment in which cyber
crime is committed.
More and more personal and sensitive information
is stored online.
 Personal: Personal emotions and vendettas.
Cybercrimes:Past & Present
Past: ego or expertise
Present: steal, deceive and exploit people.
Cybercrimes can be committed single handedly and does not require
the physical presence of the criminals.
Categories of Cyber Crime:
i. Individual:cyber stalking, distributing pornography
ii. Property:
iii. Government: cyber terrorism
Effects of Cyber Crime
 Loss Of Revenue:Caused by an outside party who
obtains sensitive financial information, using it to
withdraw funds from an organization.
 Time Loss: Time is wasted when IT personnel must
devote great portions of their day handling such
incidences.
 Damaged Reputations: customer records are
compromised by a security breach associated with
cyber crime.
 Reduced Productivity: Due to the measures that many
companies must implement to counteract cyber
crime, there is often a negative effect on employees'
productivity.
Cybercrimes in Nepal
Past
• email blackmail
• SMS blackmail
• illicit publication in online
world
• data piracy
Present
• unauthorized access of data
• Phishing
• online fraud
• online sale of counterfeit
products
• online illegal activities such
as prostitution
 How did she become victim of
cybercrime?
Cases:
a. Defamation online or Internet harassment: Nepal
Police have caught a 27 -year-old man, who allegedly impersonated a
girl in a Facebook account.
b. In Cyber cafes, children of young ages can be seen using porn sites.
c. From government to private organizations are using pirated CDs.
Software CDs can be seen in the footpaths of Kathmandu.
d. The police’s Central Investigation Bureau arrested four people, including
two foreign nationals from Nigeria and Sierra Leone, for operating a
fraud racket via SMS.
Existing measures:
a. The 2004 Act declared hacking, stealing data, pirating software and
posting defamatory information online as criminal and civil offences.
Under this law, the government can punish cyber-offenders with up to
five years of imprisonment and/or a fine of up to Rs 50,000, contingent
upon the crime’s severity.
Weak Enforcement
Although the present Act does touch on a few
important issues, the enforcement part is minimal
because of several reasons. First, both the police and
judiciary have not developed sophisticated tools to
investigate cybercrimes. At present, there are only
two units that deal with cybercrimes—the Cybercrime
Investigation Cell at Hanuman Dhoka and the Central
Investigation Bureau. But even when cybercrime cell
discovers a fake Facebook account, it can only block
the account because Nepali law does not allow access
to a user’s IP address.
Tips for Safety
1. latest security software, web browser and
operating system,updated.
2. Strong Password
3. Install Firewall
4. If you are connected to a public WiFi, don't
access sites where you need to enter your
password, credit card information etc.
5. Install Anti-virus Software
6. Monitor your Children’s Online Activities
Facebook: Emerging Cyber Crime
o What are the precautions before
crime?
o What to do after becoming victim
of cybercrime?
Zero Minute
Any Questions?
……………………………………………………
Your comments:
…………………………………………………………………..
Our Message:
………………………………………………………………………….
Best of Luck: Your SLC Exam
Thank You
Kathmandu Valley Leo Club

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 

Andere mochten auch

Current trends in cyber crime scenario
Current trends in cyber crime scenarioCurrent trends in cyber crime scenario
Current trends in cyber crime scenarioNeeraj Aarora
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get InterestingIBM Security
 
Disposal of sewage on land
Disposal of sewage on landDisposal of sewage on land
Disposal of sewage on landAnkit Gola
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 

Andere mochten auch (15)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Current trends in cyber crime scenario
Current trends in cyber crime scenarioCurrent trends in cyber crime scenario
Current trends in cyber crime scenario
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Cyber law in nepal and implementation
Cyber law in nepal and implementationCyber law in nepal and implementation
Cyber law in nepal and implementation
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Disposal of sewage on land
Disposal of sewage on landDisposal of sewage on land
Disposal of sewage on land
 
Sewage Disposal
Sewage DisposalSewage Disposal
Sewage Disposal
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie Cybercrime Awareness

Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Fahad Saleem
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in IraqAyub Nuri
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 

Ähnlich wie Cybercrime Awareness (20)

Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 

Kürzlich hochgeladen

Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesMohammad Hassany
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxMYDA ANGELICA SUAN
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and stepobaje godwin sunday
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxSaurabhParmar42
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxDr. Santhosh Kumar. N
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...Nguyen Thanh Tu Collection
 

Kürzlich hochgeladen (20)

Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming Classes
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptx
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and step
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptx
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptx
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
 

Cybercrime Awareness

  • 1. What is Cybercrime?  Cybercrime or computer crime is any crime that involves a computer and a network.  The computer used in the commission of a crime or may be the target.  Both governmental and non-state actors engage in cybercrimes.  annual damage to the global economy is at $445 billion.
  • 2. Types of Cybercrimes  Hacking: a person’s computer is broken into so that his personal or sensitive information can be accessed .  Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and software.  Cyber Stalking: Online harassment wherein the victim is subjected to a barrage of online messages and emails.
  • 3. Types of Cybercrimes  Identity Theft : a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information .  Malicious Software :These are Internet-based software or programs that are used to disrupt a network.  Child soliciting and Abuse :cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography.
  • 4. Causes of Cybercrime  Economy : perception of low risk and very high financial reward.  Ideology :perceived ethical, ideological or moral reasons.  Structural causes :the environment in which cyber crime is committed. More and more personal and sensitive information is stored online.  Personal: Personal emotions and vendettas.
  • 5. Cybercrimes:Past & Present Past: ego or expertise Present: steal, deceive and exploit people. Cybercrimes can be committed single handedly and does not require the physical presence of the criminals. Categories of Cyber Crime: i. Individual:cyber stalking, distributing pornography ii. Property: iii. Government: cyber terrorism
  • 6. Effects of Cyber Crime  Loss Of Revenue:Caused by an outside party who obtains sensitive financial information, using it to withdraw funds from an organization.  Time Loss: Time is wasted when IT personnel must devote great portions of their day handling such incidences.  Damaged Reputations: customer records are compromised by a security breach associated with cyber crime.  Reduced Productivity: Due to the measures that many companies must implement to counteract cyber crime, there is often a negative effect on employees' productivity.
  • 7. Cybercrimes in Nepal Past • email blackmail • SMS blackmail • illicit publication in online world • data piracy Present • unauthorized access of data • Phishing • online fraud • online sale of counterfeit products • online illegal activities such as prostitution
  • 8.  How did she become victim of cybercrime?
  • 9. Cases: a. Defamation online or Internet harassment: Nepal Police have caught a 27 -year-old man, who allegedly impersonated a girl in a Facebook account. b. In Cyber cafes, children of young ages can be seen using porn sites. c. From government to private organizations are using pirated CDs. Software CDs can be seen in the footpaths of Kathmandu. d. The police’s Central Investigation Bureau arrested four people, including two foreign nationals from Nigeria and Sierra Leone, for operating a fraud racket via SMS. Existing measures: a. The 2004 Act declared hacking, stealing data, pirating software and posting defamatory information online as criminal and civil offences. Under this law, the government can punish cyber-offenders with up to five years of imprisonment and/or a fine of up to Rs 50,000, contingent upon the crime’s severity.
  • 10. Weak Enforcement Although the present Act does touch on a few important issues, the enforcement part is minimal because of several reasons. First, both the police and judiciary have not developed sophisticated tools to investigate cybercrimes. At present, there are only two units that deal with cybercrimes—the Cybercrime Investigation Cell at Hanuman Dhoka and the Central Investigation Bureau. But even when cybercrime cell discovers a fake Facebook account, it can only block the account because Nepali law does not allow access to a user’s IP address.
  • 11. Tips for Safety 1. latest security software, web browser and operating system,updated. 2. Strong Password 3. Install Firewall 4. If you are connected to a public WiFi, don't access sites where you need to enter your password, credit card information etc. 5. Install Anti-virus Software 6. Monitor your Children’s Online Activities
  • 12. Facebook: Emerging Cyber Crime o What are the precautions before crime? o What to do after becoming victim of cybercrime?
  • 13. Zero Minute Any Questions? …………………………………………………… Your comments: ………………………………………………………………….. Our Message: …………………………………………………………………………. Best of Luck: Your SLC Exam Thank You Kathmandu Valley Leo Club