SlideShare uma empresa Scribd logo
1 de 15
CYBER CRIMECYBER CRIME
WHAT IS CYBER CRIMEWHAT IS CYBER CRIME
COMPUTER CRIMECOMPUTER CRIME
refers to any crimerefers to any crime
that involves athat involves a
computer and acomputer and a
network where thenetwork where the
computers may or maycomputers may or may
not have played annot have played an
instrumental part ininstrumental part in
the commission of athe commission of a
crime.crime.
DEFINITION(CONT)DEFINITION(CONT)
A computer can be a source of evidence.A computer can be a source of evidence.
Even though the computer is not directlyEven though the computer is not directly
used for criminal purposes. It is anused for criminal purposes. It is an
excellent device for record keeping , andexcellent device for record keeping , and
can be of great value to criminalcan be of great value to criminal
investigationsinvestigations
Technological advancements have createdTechnological advancements have created
new possibilities for criminal activity innew possibilities for criminal activity in
particular the criminal misuse ofparticular the criminal misuse of
information technologies.information technologies.
TYPES OF CRIMETYPES OF CRIME
1. Unauthorized access and hacking1. Unauthorized access and hacking
It means any kind of access without the permission of eitherIt means any kind of access without the permission of either
the rightful owner or the person in charge of a computer ,the rightful owner or the person in charge of a computer ,
computer system , computer network.computer system , computer network.
2. Trojan attack2. Trojan attack
The program that act like something useful but do the thingsThe program that act like something useful but do the things
that are quiet damaging . The programs of this kind arethat are quiet damaging . The programs of this kind are
called as Trojanscalled as Trojans
the name Trojan is very popularthe name Trojan is very popular
TYPES (CONT.)TYPES (CONT.)
3.3. Virus and worm attackVirus and worm attack
A program that has capability to inject other programsA program that has capability to inject other programs
and make copies of itself and spread into other programs isand make copies of itself and spread into other programs is
called virus.called virus.
4.4. E-mail and IRL related crimesE-mail and IRL related crimes
(i) Email spoofing(i) Email spoofing
It refers to email that appears to have been originated fromIt refers to email that appears to have been originated from
one source when it was actually sent from another sourceone source when it was actually sent from another source
TYPES (CONT.)TYPES (CONT.)
(ii) Email spamming(ii) Email spamming
It refers to sending email to thousands and thousands ofIt refers to sending email to thousands and thousands of
users similar to a chain letterusers similar to a chain letter
(iii) Sending malicious order through email(iii) Sending malicious order through email
Emails are used to send virus Trojan etc through emails asEmails are used to send virus Trojan etc through emails as
an attachmentan attachment
Email bombingEmail bombing
(iv)(iv) It is characterized by abuses repeatedly sending an identicalIt is characterized by abuses repeatedly sending an identical
email message to a particular addressemail message to a particular address
TYPES (CONTD)TYPES (CONTD)
(v)(v) Sending threatening emailsSending threatening emails
(vi) Defamatory emails(vi) Defamatory emails
(vii) Email frauds(vii) Email frauds
(viii) IRC related(viii) IRC related
5. Denial of service attack5. Denial of service attack
flooding a computer resource with more requestsflooding a computer resource with more requests thanthan
it can handle. This causes the resourceit can handle. This causes the resource to crash therebyto crash thereby
denying access of service to authorized users.denying access of service to authorized users.
TYPES(CONT)TYPES(CONT)
6.6. ForgeryForgery
Counterfeit currency notes postage and revenue stampsCounterfeit currency notes postage and revenue stamps
mark sheets etc can be forged using sophisticatedmark sheets etc can be forged using sophisticated
computers printers and scannerscomputers printers and scanners
7.7. IPR violationsIPR violations
These include software piracy copyright infringementThese include software piracy copyright infringement
trademark violation theft of computer source code etc.trademark violation theft of computer source code etc.
TYPES (CONT)TYPES (CONT)
8. Cyber terrorism8. Cyber terrorism
Targeted attacks on militaryTargeted attacks on military
installations, power plants, air traffic control, banks,installations, power plants, air traffic control, banks,
telecommunications networks are the most likely targets.telecommunications networks are the most likely targets.
99.. Banking/Credit card related crimesBanking/Credit card related crimes
Use of stolen card information or fake credit/debit cards areUse of stolen card information or fake credit/debit cards are
common.common.
1010.. Theft of Internet hoursTheft of Internet hours
Unauthorized use of internet hours paid for by anotherUnauthorized use of internet hours paid for by another
person.person.
TYPES (CONT)TYPES (CONT)
11. Defamation11. Defamation
When someone publishes defamatory matter about someoneWhen someone publishes defamatory matter about someone
on a website or sends e-mails containing defamatoryon a website or sends e-mails containing defamatory
information to all of that persons friends.information to all of that persons friends.
12. Cyber stalking12. Cyber stalking
It involves following a persons movement across the internetIt involves following a persons movement across the internet
by posting messages on the bulletins board frequented by theby posting messages on the bulletins board frequented by the
victim , constantly bombarding the victim with emails etcvictim , constantly bombarding the victim with emails etc
13. Identity theft13. Identity theft
It occurs when someone appropriates another’s personalIt occurs when someone appropriates another’s personal
information without their knowledge to commit theft.information without their knowledge to commit theft.
IT ACT OF INDIA 2000IT ACT OF INDIA 2000
In May 2000 both the houses of the Indian Parliament passedIn May 2000 both the houses of the Indian Parliament passed
the Information Technology Bill.the Information Technology Bill.
This act deals with the various cyber crimes in Chapter IX andThis act deals with the various cyber crimes in Chapter IX and
XI, Sections 43 in particular deals with the unauthorizedXI, Sections 43 in particular deals with the unauthorized
access, unauthorized downloading, virus attacks, denial ofaccess, unauthorized downloading, virus attacks, denial of
access, distributions. This section provide for a fine up to Rs.access, distributions. This section provide for a fine up to Rs.
one crore by way of remedy. Sec 65 deals with tampering withone crore by way of remedy. Sec 65 deals with tampering with
computer source documents and provides for imprisonmentcomputer source documents and provides for imprisonment
upto 3 years or fine which may extend upto 2 years or both.upto 3 years or fine which may extend upto 2 years or both.
Section 66 deals with hacking with computer system andSection 66 deals with hacking with computer system and
provides for imprisonment upto 3 years or fine which mayprovides for imprisonment upto 3 years or fine which may
extend upto 2 years or both.extend upto 2 years or both.
PREVENTION OF CYBER CRIMEPREVENTION OF CYBER CRIME
Prevention is better than cure. It is always better to takePrevention is better than cure. It is always better to take
certain precaution while operating the net. One should keep incertain precaution while operating the net. One should keep in
mind the following:-mind the following:-
1. To prevent cyber stalking avoid disclosing any information1. To prevent cyber stalking avoid disclosing any information
pertaining to oneself.pertaining to oneself.
2. Always use latest and update antivirus software to guard2. Always use latest and update antivirus software to guard
against virus attacks.against virus attacks.
3. Always avoid sending any photograph online particularly to3. Always avoid sending any photograph online particularly to
strangers and chat friends.strangers and chat friends.
4. Never send your credit card numbers to any site that is not4. Never send your credit card numbers to any site that is not
secured to guard against frauds.secured to guard against frauds.
5. Use of firewalls may be beneficial.5. Use of firewalls may be beneficial.
PREVENTION (CONT)PREVENTION (CONT)
6. Always keep a watch on the sides that your children are6. Always keep a watch on the sides that your children are
accessing to prevent any kind of harrassmentaccessing to prevent any kind of harrassment
7. It is better to use a security programme that gives7. It is better to use a security programme that gives
control over the cookies.control over the cookies.
CONCLUSIONCONCLUSION
Capacity of human mind is unfathomable.Capacity of human mind is unfathomable.
It is not possible to eliminate cyber crimeIt is not possible to eliminate cyber crime
from the cyber space. The only possiblefrom the cyber space. The only possible
step is to make people aware of their rightsstep is to make people aware of their rights
and duties and further making theand duties and further making the
application of the laws more stringent toapplication of the laws more stringent to
check crime.check crime.
THANKSTHANKS
A POWERPOINT PRESENTATIONA POWERPOINT PRESENTATION
BYBY
AVASYU GUPTAAVASYU GUPTA
IX DIX D

Mais conteúdo relacionado

Mais procurados

Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing AttacksPECB
 
12 Top Talks from BSides San Francisco 2016
12 Top Talks from BSides San Francisco 201612 Top Talks from BSides San Francisco 2016
12 Top Talks from BSides San Francisco 2016Tripwire
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 
Newsletter sept 11
Newsletter sept 11Newsletter sept 11
Newsletter sept 11captsbtyagi
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
Password selection,piggybacking-
Password selection,piggybacking-Password selection,piggybacking-
Password selection,piggybacking-Baljit Saini
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)itgsabc
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrimeAryan Ajmer
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentationMaazUddin7
 

Mais procurados (17)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 
Facebook
FacebookFacebook
Facebook
 
12 Top Talks from BSides San Francisco 2016
12 Top Talks from BSides San Francisco 201612 Top Talks from BSides San Francisco 2016
12 Top Talks from BSides San Francisco 2016
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Newsletter sept 11
Newsletter sept 11Newsletter sept 11
Newsletter sept 11
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Password selection,piggybacking-
Password selection,piggybacking-Password selection,piggybacking-
Password selection,piggybacking-
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Piggybacking
PiggybackingPiggybacking
Piggybacking
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 

Semelhante a Cyber crime in WORLD

NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 

Semelhante a Cyber crime in WORLD (20)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
English in written
English in writtenEnglish in written
English in written
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 

Último

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Último (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 

Cyber crime in WORLD

  • 2. WHAT IS CYBER CRIMEWHAT IS CYBER CRIME COMPUTER CRIMECOMPUTER CRIME refers to any crimerefers to any crime that involves athat involves a computer and acomputer and a network where thenetwork where the computers may or maycomputers may or may not have played annot have played an instrumental part ininstrumental part in the commission of athe commission of a crime.crime.
  • 3. DEFINITION(CONT)DEFINITION(CONT) A computer can be a source of evidence.A computer can be a source of evidence. Even though the computer is not directlyEven though the computer is not directly used for criminal purposes. It is anused for criminal purposes. It is an excellent device for record keeping , andexcellent device for record keeping , and can be of great value to criminalcan be of great value to criminal investigationsinvestigations Technological advancements have createdTechnological advancements have created new possibilities for criminal activity innew possibilities for criminal activity in particular the criminal misuse ofparticular the criminal misuse of information technologies.information technologies.
  • 4. TYPES OF CRIMETYPES OF CRIME 1. Unauthorized access and hacking1. Unauthorized access and hacking It means any kind of access without the permission of eitherIt means any kind of access without the permission of either the rightful owner or the person in charge of a computer ,the rightful owner or the person in charge of a computer , computer system , computer network.computer system , computer network. 2. Trojan attack2. Trojan attack The program that act like something useful but do the thingsThe program that act like something useful but do the things that are quiet damaging . The programs of this kind arethat are quiet damaging . The programs of this kind are called as Trojanscalled as Trojans the name Trojan is very popularthe name Trojan is very popular
  • 5. TYPES (CONT.)TYPES (CONT.) 3.3. Virus and worm attackVirus and worm attack A program that has capability to inject other programsA program that has capability to inject other programs and make copies of itself and spread into other programs isand make copies of itself and spread into other programs is called virus.called virus. 4.4. E-mail and IRL related crimesE-mail and IRL related crimes (i) Email spoofing(i) Email spoofing It refers to email that appears to have been originated fromIt refers to email that appears to have been originated from one source when it was actually sent from another sourceone source when it was actually sent from another source
  • 6. TYPES (CONT.)TYPES (CONT.) (ii) Email spamming(ii) Email spamming It refers to sending email to thousands and thousands ofIt refers to sending email to thousands and thousands of users similar to a chain letterusers similar to a chain letter (iii) Sending malicious order through email(iii) Sending malicious order through email Emails are used to send virus Trojan etc through emails asEmails are used to send virus Trojan etc through emails as an attachmentan attachment Email bombingEmail bombing (iv)(iv) It is characterized by abuses repeatedly sending an identicalIt is characterized by abuses repeatedly sending an identical email message to a particular addressemail message to a particular address
  • 7. TYPES (CONTD)TYPES (CONTD) (v)(v) Sending threatening emailsSending threatening emails (vi) Defamatory emails(vi) Defamatory emails (vii) Email frauds(vii) Email frauds (viii) IRC related(viii) IRC related 5. Denial of service attack5. Denial of service attack flooding a computer resource with more requestsflooding a computer resource with more requests thanthan it can handle. This causes the resourceit can handle. This causes the resource to crash therebyto crash thereby denying access of service to authorized users.denying access of service to authorized users.
  • 8. TYPES(CONT)TYPES(CONT) 6.6. ForgeryForgery Counterfeit currency notes postage and revenue stampsCounterfeit currency notes postage and revenue stamps mark sheets etc can be forged using sophisticatedmark sheets etc can be forged using sophisticated computers printers and scannerscomputers printers and scanners 7.7. IPR violationsIPR violations These include software piracy copyright infringementThese include software piracy copyright infringement trademark violation theft of computer source code etc.trademark violation theft of computer source code etc.
  • 9. TYPES (CONT)TYPES (CONT) 8. Cyber terrorism8. Cyber terrorism Targeted attacks on militaryTargeted attacks on military installations, power plants, air traffic control, banks,installations, power plants, air traffic control, banks, telecommunications networks are the most likely targets.telecommunications networks are the most likely targets. 99.. Banking/Credit card related crimesBanking/Credit card related crimes Use of stolen card information or fake credit/debit cards areUse of stolen card information or fake credit/debit cards are common.common. 1010.. Theft of Internet hoursTheft of Internet hours Unauthorized use of internet hours paid for by anotherUnauthorized use of internet hours paid for by another person.person.
  • 10. TYPES (CONT)TYPES (CONT) 11. Defamation11. Defamation When someone publishes defamatory matter about someoneWhen someone publishes defamatory matter about someone on a website or sends e-mails containing defamatoryon a website or sends e-mails containing defamatory information to all of that persons friends.information to all of that persons friends. 12. Cyber stalking12. Cyber stalking It involves following a persons movement across the internetIt involves following a persons movement across the internet by posting messages on the bulletins board frequented by theby posting messages on the bulletins board frequented by the victim , constantly bombarding the victim with emails etcvictim , constantly bombarding the victim with emails etc 13. Identity theft13. Identity theft It occurs when someone appropriates another’s personalIt occurs when someone appropriates another’s personal information without their knowledge to commit theft.information without their knowledge to commit theft.
  • 11. IT ACT OF INDIA 2000IT ACT OF INDIA 2000 In May 2000 both the houses of the Indian Parliament passedIn May 2000 both the houses of the Indian Parliament passed the Information Technology Bill.the Information Technology Bill. This act deals with the various cyber crimes in Chapter IX andThis act deals with the various cyber crimes in Chapter IX and XI, Sections 43 in particular deals with the unauthorizedXI, Sections 43 in particular deals with the unauthorized access, unauthorized downloading, virus attacks, denial ofaccess, unauthorized downloading, virus attacks, denial of access, distributions. This section provide for a fine up to Rs.access, distributions. This section provide for a fine up to Rs. one crore by way of remedy. Sec 65 deals with tampering withone crore by way of remedy. Sec 65 deals with tampering with computer source documents and provides for imprisonmentcomputer source documents and provides for imprisonment upto 3 years or fine which may extend upto 2 years or both.upto 3 years or fine which may extend upto 2 years or both. Section 66 deals with hacking with computer system andSection 66 deals with hacking with computer system and provides for imprisonment upto 3 years or fine which mayprovides for imprisonment upto 3 years or fine which may extend upto 2 years or both.extend upto 2 years or both.
  • 12. PREVENTION OF CYBER CRIMEPREVENTION OF CYBER CRIME Prevention is better than cure. It is always better to takePrevention is better than cure. It is always better to take certain precaution while operating the net. One should keep incertain precaution while operating the net. One should keep in mind the following:-mind the following:- 1. To prevent cyber stalking avoid disclosing any information1. To prevent cyber stalking avoid disclosing any information pertaining to oneself.pertaining to oneself. 2. Always use latest and update antivirus software to guard2. Always use latest and update antivirus software to guard against virus attacks.against virus attacks. 3. Always avoid sending any photograph online particularly to3. Always avoid sending any photograph online particularly to strangers and chat friends.strangers and chat friends. 4. Never send your credit card numbers to any site that is not4. Never send your credit card numbers to any site that is not secured to guard against frauds.secured to guard against frauds. 5. Use of firewalls may be beneficial.5. Use of firewalls may be beneficial.
  • 13. PREVENTION (CONT)PREVENTION (CONT) 6. Always keep a watch on the sides that your children are6. Always keep a watch on the sides that your children are accessing to prevent any kind of harrassmentaccessing to prevent any kind of harrassment 7. It is better to use a security programme that gives7. It is better to use a security programme that gives control over the cookies.control over the cookies.
  • 14. CONCLUSIONCONCLUSION Capacity of human mind is unfathomable.Capacity of human mind is unfathomable. It is not possible to eliminate cyber crimeIt is not possible to eliminate cyber crime from the cyber space. The only possiblefrom the cyber space. The only possible step is to make people aware of their rightsstep is to make people aware of their rights and duties and further making theand duties and further making the application of the laws more stringent toapplication of the laws more stringent to check crime.check crime.
  • 15. THANKSTHANKS A POWERPOINT PRESENTATIONA POWERPOINT PRESENTATION BYBY AVASYU GUPTAAVASYU GUPTA IX DIX D