2
Most read
6
Most read
10
Most read
Cyber Crime
By
Pratham Jaiswal
20BCE1795
What is Cyber Crime?
❏ Cybercrime is criminal activity that either targets or uses a
computer, a computer network or a networked device.
❏ Mostly cybercrime is committed by cyber criminals or hackers
who want to make money.
History
❏ Surprisingly, the first recorded Cyber Crime took place in 1820.
❏ The first spam email took place on May 3rd, 1978, sent out to
400 out of 2600 people on ARPAnet.
❏ The first ever computer virus, named Elk Cloner, was written in
1982 by a 15 year old Rich Skrenta, designed to infect Apple II
computers.
Categorization of Cyber Crimes
1. The Computer as a Target
1. The Computer as a Weapon
Types of Cyber Crime
1. Hacking
2. Denial of Service Attack
3. Virus Dissemination
4. Computer Vandalism
5. Cyber Terrorism
6. Software Piracy
Case Study on Cyber Crime:
Capital One Data Breach
In 2019 happened one of the biggest data breaches ever. A hacker
gained access to more than 100 million Capital One customers'
accounts and credit card applications.
Case Study on Cyber Crime:
Capital One Data Breach
Paige Thompson is accused of breaking into a Capital One server
and gaining access to 140,000 Social Security numbers, 1 million
Canadian Social Insurance numbers and 80,000 bank account
numbers, in addition to an undisclosed number of people's names,
addresses, credit scores, credit limits, balances, and other
information, according to the bank and the US Department of
Justice.
Case Study on Cyber Crime:
Capital One Data Breach
Thompson tried to share the information with others online. The 33-
year-old had previously worked as a tech company software
engineer for Amazon Web Services, the cloud hosting company
that Capital One was using. She was able to gain access by
exploiting a misconfigured web application firewall.
Case Study on Cyber Crime:
Capital One Data Breach
The breach affected around 100 million people in the United States
and about 6 million people in Canada, according to Capital One.
According to the Company, no credit card account numbers or log-
in credentials were compromised and over 99% of Social Security
numbers were not compromised.
Safety Tips for Cyber Crime
1. Use trusted AntiVirus software
2. Insert Firewalls
3. Use strong passwords
4. Keep your software updated
5. Protect your Wifi
6. Never disclose your account or any personal details to someone
on the internet or on the phone
7. Never send credit/debit card details on any untrusted site
Thank
You

More Related Content

PDF
Authentication techniques
PPTX
METAVERSE SEMINAR PRESENTATION.pptx
PPTX
Cyber Security Case Studies
PPTX
Ethical Issues in Indian Business
PPTX
Eye gaze communication
PPTX
Cyber crime in India PPT .pptx
PDF
Metaverse - The Future of Marketing and Web 3.0 (1) Linked.pdf
Authentication techniques
METAVERSE SEMINAR PRESENTATION.pptx
Cyber Security Case Studies
Ethical Issues in Indian Business
Eye gaze communication
Cyber crime in India PPT .pptx
Metaverse - The Future of Marketing and Web 3.0 (1) Linked.pdf

What's hot (20)

PPTX
Cyber crime ppt
PPTX
CYBER SECURITY
PPTX
Cyber Crime
PDF
Case study on cyber crime
PPTX
PPTX
case study on cyber crime
PPTX
Phishing attack seminar presentation
PPTX
Cyber crime and cyber laws
PPTX
Cyber crime and security
PPT
Phishing attacks ppt
PPTX
Cyber Crime and Security
PPTX
Cybersecurity 2 cyber attacks
PPTX
Data breach
PPT
P H I S H I N G
PPT
CYBER-CRIME PRESENTATION.ppt
PPTX
Cyber Crime and Security Presentation
PPTX
It act and cyber crime
PPTX
Cyber Crime And Security
PPTX
Cyber Security Presentation
PPTX
Cyber Crime
Cyber crime ppt
CYBER SECURITY
Cyber Crime
Case study on cyber crime
case study on cyber crime
Phishing attack seminar presentation
Cyber crime and cyber laws
Cyber crime and security
Phishing attacks ppt
Cyber Crime and Security
Cybersecurity 2 cyber attacks
Data breach
P H I S H I N G
CYBER-CRIME PRESENTATION.ppt
Cyber Crime and Security Presentation
It act and cyber crime
Cyber Crime And Security
Cyber Security Presentation
Cyber Crime
Ad

Similar to Cyber Crime and a Case Study (20)

PPTX
Cyber crime ppt
PPT
Driving Payment Innovation - Know Your Enemy
PPT
L Scope
PPTX
Cyber crime
PPTX
Updated Cyber Security and Fraud Prevention Tools Tactics
PPTX
Network security threats ahmed s. gifel
PPSX
Unit 1
PPT
Cyber laws
PPTX
CyberSecurity.pptx
PPT
Unearthing and Dissecting Internet Fraud
PDF
Cyber security olive green mint ppt .pdf
PPT
Cyber Crime
PDF
ccs12-18022310494mghmgmyy3 (1).pdf
PPTX
Cyber Security in Society
PPTX
PPTX
Types Of Computer Crime
PPTX
Module 1.pptx
PDF
Rise of cyber security v0.1
PDF
Identity Theft: Evolving with Technology
PPTX
Baker Tilly Presents: Emerging Trends in Cybersecurity
Cyber crime ppt
Driving Payment Innovation - Know Your Enemy
L Scope
Cyber crime
Updated Cyber Security and Fraud Prevention Tools Tactics
Network security threats ahmed s. gifel
Unit 1
Cyber laws
CyberSecurity.pptx
Unearthing and Dissecting Internet Fraud
Cyber security olive green mint ppt .pdf
Cyber Crime
ccs12-18022310494mghmgmyy3 (1).pdf
Cyber Security in Society
Types Of Computer Crime
Module 1.pptx
Rise of cyber security v0.1
Identity Theft: Evolving with Technology
Baker Tilly Presents: Emerging Trends in Cybersecurity
Ad

Recently uploaded (20)

PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPTX
Internet of Everything -Basic concepts details
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Lung cancer patients survival prediction using outlier detection and optimize...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
4 layer Arch & Reference Arch of IoT.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
NewMind AI Weekly Chronicles – August ’25 Week IV
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
LMS bot: enhanced learning management systems for improved student learning e...
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Early detection and classification of bone marrow changes in lumbar vertebrae...
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Internet of Everything -Basic concepts details
giants, standing on the shoulders of - by Daniel Stenberg
Co-training pseudo-labeling for text classification with support vector machi...
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Training Program for knowledge in solar cell and solar industry
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...

Cyber Crime and a Case Study

  • 2. What is Cyber Crime? ❏ Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. ❏ Mostly cybercrime is committed by cyber criminals or hackers who want to make money.
  • 3. History ❏ Surprisingly, the first recorded Cyber Crime took place in 1820. ❏ The first spam email took place on May 3rd, 1978, sent out to 400 out of 2600 people on ARPAnet. ❏ The first ever computer virus, named Elk Cloner, was written in 1982 by a 15 year old Rich Skrenta, designed to infect Apple II computers.
  • 4. Categorization of Cyber Crimes 1. The Computer as a Target 1. The Computer as a Weapon
  • 5. Types of Cyber Crime 1. Hacking 2. Denial of Service Attack 3. Virus Dissemination 4. Computer Vandalism 5. Cyber Terrorism 6. Software Piracy
  • 6. Case Study on Cyber Crime: Capital One Data Breach In 2019 happened one of the biggest data breaches ever. A hacker gained access to more than 100 million Capital One customers' accounts and credit card applications.
  • 7. Case Study on Cyber Crime: Capital One Data Breach Paige Thompson is accused of breaking into a Capital One server and gaining access to 140,000 Social Security numbers, 1 million Canadian Social Insurance numbers and 80,000 bank account numbers, in addition to an undisclosed number of people's names, addresses, credit scores, credit limits, balances, and other information, according to the bank and the US Department of Justice.
  • 8. Case Study on Cyber Crime: Capital One Data Breach Thompson tried to share the information with others online. The 33- year-old had previously worked as a tech company software engineer for Amazon Web Services, the cloud hosting company that Capital One was using. She was able to gain access by exploiting a misconfigured web application firewall.
  • 9. Case Study on Cyber Crime: Capital One Data Breach The breach affected around 100 million people in the United States and about 6 million people in Canada, according to Capital One. According to the Company, no credit card account numbers or log- in credentials were compromised and over 99% of Social Security numbers were not compromised.
  • 10. Safety Tips for Cyber Crime 1. Use trusted AntiVirus software 2. Insert Firewalls 3. Use strong passwords 4. Keep your software updated 5. Protect your Wifi 6. Never disclose your account or any personal details to someone on the internet or on the phone 7. Never send credit/debit card details on any untrusted site