You are on page 1of 11

CYBER CRIME

PRESENTED BY: NIKIT SHRESTHA


CONTENTS
• Introduction
• Types of Cybercrime
• Impacts of Cybercrime
• Hacking
• Cyber Crime in Nepal
• Prevention Of Cyber Crime
Cyber Crime: Introduction

• Cybercrime is basically crimes committed using computers or the


Internet.
• This includes things like stealing personal info, tricking people into
giving sensitive information, spreading harmful software, harassing
others online, leaking confidential data, bullying people digitally,
and running online scams.
• It's tricky to tackle because it's global and often hard to trace back
to the perpetrators. So, it's super important to stay cautious online
and use strong cybersecurity measures to protect yourself.
Types of Cyber Crime
• Cyber Fraud: This includes various forms of fraud conducted online, such as
identity theft, credit card fraud, investment fraud, and online scams.

• Cyber Attacks: These are deliberate and malicious actions aimed at disrupting,
damaging, or gaining unauthorized access to computer systems or networks.
Examples include malware attacks, denial-of-service (DoS) attacks, and hacking.

• Cyber Harassment and Cyberstalking: This involves using digital communication


platforms to harass, threaten, or intimidate individuals. It can include sending
harassing emails or messages, spreading rumors or false information, and
stalking individuals online.
Impacts of Cyber Crime

• Financial Loss: Cybercrime can result in • Disruption of Services: Cyberattacks, such as


significant financial losses for individuals and denial-of-service (DoS) attacks or ransomware
businesses through theft, fraud, extortion, or attacks, can disrupt critical services, including
disruption of services. websites, online platforms, financial systems,
• Identity Theft: Victims of cybercrime may or essential infrastructure, causing
suffer from identity theft, where their personal inconvenience, financial loss, and potential
information is stolen and used for fraudulent safety risks.
purposes, leading to financial loss, damaged
credit, and reputational harm. • Loss of Privacy: Cybercrime can invade
• Data Breaches: Data breaches can expose individuals' privacy by illegally accessing or
sensitive information, such as personal data, monitoring their online activities,
financial records, or intellectual property, communications, or personal information,
leading to reputational damage, legal leading to feelings of violation, anxiety, and
consequences, and financial loss for affected loss of trust in digital technologies
individuals and organizations.
Cyber Crime

United States of America China Germany Britain Brazil Spain Italy France Turkey Poland India

All Other Countries


Hacking
• Hacking involves exploiting vulnerabilities in computer systems or networks to gain
unauthorized access or manipulate data.
• It ranges from ethical hacking for security testing to malicious activities like stealing
information or disrupting services.
• Hackers employ various techniques, including phishing, malware, and social
engineering, posing significant risks to digital security.
Cyber Crime in Nepal
• Cybercrime in Nepal is on the rise, presenting significant challenges to
individuals, businesses, and government entities.
• Common cybercrimes include hacking, online fraud, identity theft, and
cyberbullying.
• The lack of stringent cyber laws and limited cybersecurity infrastructure
exacerbates the problem, leaving many vulnerable to attacks.
• Addressing cybercrime in Nepal necessitates improved legislation,
enhanced law enforcement capabilities, and increased public awareness
about online safety measures.
• Additionally, the rapid expansion of internet access and digital
technologies in Nepal has widened the scope for cybercriminal
activities, requiring concerted efforts to strengthen cybersecurity
measures and enforcement mechanisms.
Prevention of Cyber Crime
• Prevention of cybercrime requires a multi-faceted approach
encompassing both technological and behavioral strategies.
• Implementing robust cybersecurity measures such as firewalls,
encryption, and antivirus software can fortify digital defenses
against external threats.
• Moreover, fostering a culture of awareness through education and
training programs empowers individuals to recognize and avoid
potential cyber risks.
• Collaboration between government agencies, law enforcement, and
private sectors is vital for implementing comprehensive
cybersecurity frameworks and swiftly addressing emerging cyber
threats.
Thank you!

You might also like