SlideShare a Scribd company logo
1 of 28
GRACY J. JOSEPH (T.E. CMPN ENGG.)
CONTENTS
 INTRODUCTION
 HISTORY
 CATEGORIES
 TYPES OF CYBER CRIME
 CYBER CRIMINALS
 CYBER SECURITY
 PREVENTION
 CYBER LAW
 CONCLUSION
INTRODUCTION
Cyber Crime is an activity done by the Computers
and Internet. It is an unlawful acts wherein the
computer is either a tool or a target or both.
HISTORY
 The first recorded cyber crime took place
in 1820.
 That is not surprising considering the fact
that the abacus, which is thought to be the
earliest form of a computer has been
around since 3500 B.C.
 The first virus was installed on an apple
computer in 1982.
CATEGORIES OF CYBER CRIME
 Cyber Crimes against persons
 Cyber Crimes against property
 Cyber Crimes against government
 Cyber Crimes against persons
 Harassment via emails
 Carding
 E-mail/SMS
 Spoofing
 Assault by threat
Cyber Crimes against
property
 Intellectual property crimes
 Cyber Squatting
 Cyber Vandalism
 Transmitting virus
 Internet time theft
Cyber Crimes against
Government
 Terrorism
 Fraud
 Cyber Warfare
TYPES OF CYBER CRIME
Hacking
Child Pornography
Denial of Service Attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Privacy
oHacking
Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
Hacking may refer to:
 Computer hacking
 Phone hacking
 Roof and Tunnel hacking, etc
oChild Pornography
 The internet is being highly used by its
abusers to reach and abuse children
sexually, worldwide.
 Laws regarding child
pornography generally include sexual
images involving prepubescents,
pubescent or post-pubescent minors and
computer-generated images that appear
to involve them.
oDenial of Service Attack
 Act by the criminal, who floods the
bandwidth of the victims network or fills his
e-mail box with spam mail depriving him of
the services he is entitled to access or provide.
 Short for denial-of-service attack, a type
of attack on a network that is designed to
bring the network to its knees by flooding it
with useless traffic. Many DoS attacks, such
as the Ping of Death and Tear drop attacks,
exploit limitations in the TCP/IP protocols.
oVirus Dissemination
 Malicious software that attaches itself
to other software. (viruses, worms,
Trojan, horse, e-mail bombing etc.)
 There are estimated 30,000 computer
viruses in existence.
Over 300 new ones are created each
month
First virus was created to show
loopholes in software.
oComputer Vandalism
 Damaging or destroying data rather
than stealing or misusing them is
called cyber vandalism.
 On the Internet, includes acts such as a
cracker’s replacing the original Web
page with profanity or some racist
oCyber Terrorism
 Use of internet based attacks in terrorist
activities. These terrorists are using 512-bit
encryption, which is impossible to decrypt.
 Cyber terrorism can be also defined as the
intentional use of computer, networks, and
public internet to cause destruction and
harm for personal objectives.
 Objectives may be political or ideological
since this can be seen as a form of terrorism.
oSoftware Privacy
 Theft of software through the illegal copying
of genuine programs.
 Distribution of products intended to pass for
the original.
 The majority of software today is purchased
as a one-site license,
meaning that only one
computer may have that
software installed on it at
one time.
CYBER CRIMINALS
Cyber criminal is an a individual who commits cyber
crime where heshe makes use of the computer either
as a tool or as a target or as a both.
Cybercriminals use computers in three broad ways:
 Select computer as their target: These criminals
attack other people's computers to perform malicious
activities, such as spreading viruses, data theft,
identity theft, etc.
 Uses computer as their weapon: They use the
computer to carry out "conventional crime", such as
spam, fraud, illegal gambling, etc.
 Uses computer as their accessory: They use the
computer to save stolen or illegal data.
TYPES OF CYBER
CRIMINALS
 Script Kiddies
 Scammers
 Hacker groups
 Phishers
 Insiders
 Cyber terrorists
CYBER SECURITY
 Cyber security focuses on protecting computers,
networks, programs and data from unintended or
unauthorized access, change or destruction.
 Computer security, also known as cyber security or
IT security, is the protection of information
systems from theft or damage to the hardware, the
software, and to the information on them, as well
as from disruption or misdirection of the services
they provide.
NEED OF CYBER
SECURITY
 Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from
viruses.
 Hacking, cracking and other forms of cyber
mischief have reached a level of sophistication
equalling (and in many cases surpassing) the
capability of most organizations to defend
against.
ADVANTAGES OF CYBER
SECURITY
 Protects system against viruses, worms,
spyware and other unwanted
programs.
 Protection against data from theft.
 Protects the computer from being
hacked.
 Minimizes computer freezing and
crashes.
 Gives privacy to users
PREVENTION TIPS
 Use strong passwords
 Install the latest OS updates
 Secure your wireless network
 Secure your computer by activating
firewall and using anti-virus software's
 Maintain backups
 Check security settings
CYBER
LAW
 Cyber law is an attempt to integrate the
challenges presented by human activity
on the Internet with legacy system of laws
applicable to the physical world.
IT ACT PROVISIONS
 E-mail would now be a valid and legal form of
communication in our country that can be duly
produced and approved in a court of law.
 Companies shall now be able to carry out electronic
commerce using the legal infrastructure provided
by the Act.
 Digital signatures have been given legal validity and
sanction in the Act.
CYBER LAWS AMENDMENTS
 INDIAN PENAL CODE,1860
 INDIAN EVIDENCE ACT,1872
 BANKER’S BOOK EVIDENCE
ACT,1891
 GENERAL CLAUSES ACT,1897
CONCLUSION
 Technology is destructive only in the hands of
people who do not realize that they are one and
the same process as the universe.
 Cybercrime is a major problem – and growing
 Cybercrime is about much more than hackers
 There is a natural adversarial relationship
between IT and police
 Successful prosecution of cybercrime must be a
team effort
 IT personnel must learn investigation and police
must learn technology
Cyber crime ppt

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja
 

What's hot (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber crime
cyber crimecyber crime
cyber crime
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
Ujjwal Tripathi
 

Viewers also liked (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It presentation cyber crime
It presentation cyber crimeIt presentation cyber crime
It presentation cyber crime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Basic about cyber crime, computer crime
Basic about cyber crime, computer crimeBasic about cyber crime, computer crime
Basic about cyber crime, computer crime
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI
 
66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 

Similar to Cyber crime ppt

cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 

Similar to Cyber crime ppt (20)

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 

Cyber crime ppt

  • 1. GRACY J. JOSEPH (T.E. CMPN ENGG.)
  • 2. CONTENTS  INTRODUCTION  HISTORY  CATEGORIES  TYPES OF CYBER CRIME  CYBER CRIMINALS  CYBER SECURITY  PREVENTION  CYBER LAW  CONCLUSION
  • 3. INTRODUCTION Cyber Crime is an activity done by the Computers and Internet. It is an unlawful acts wherein the computer is either a tool or a target or both.
  • 4. HISTORY  The first recorded cyber crime took place in 1820.  That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer has been around since 3500 B.C.  The first virus was installed on an apple computer in 1982.
  • 5. CATEGORIES OF CYBER CRIME  Cyber Crimes against persons  Cyber Crimes against property  Cyber Crimes against government
  • 6.  Cyber Crimes against persons  Harassment via emails  Carding  E-mail/SMS  Spoofing  Assault by threat
  • 7. Cyber Crimes against property  Intellectual property crimes  Cyber Squatting  Cyber Vandalism  Transmitting virus  Internet time theft
  • 8. Cyber Crimes against Government  Terrorism  Fraud  Cyber Warfare
  • 9.
  • 10. TYPES OF CYBER CRIME Hacking Child Pornography Denial of Service Attack Virus Dissemination Computer Vandalism Cyber Terrorism Software Privacy
  • 11. oHacking Hacking in simple terms means an illegal intrusion into a computer system and/or network. Hacking may refer to:  Computer hacking  Phone hacking  Roof and Tunnel hacking, etc
  • 12. oChild Pornography  The internet is being highly used by its abusers to reach and abuse children sexually, worldwide.  Laws regarding child pornography generally include sexual images involving prepubescents, pubescent or post-pubescent minors and computer-generated images that appear to involve them.
  • 13. oDenial of Service Attack  Act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.  Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Tear drop attacks, exploit limitations in the TCP/IP protocols.
  • 14. oVirus Dissemination  Malicious software that attaches itself to other software. (viruses, worms, Trojan, horse, e-mail bombing etc.)  There are estimated 30,000 computer viruses in existence. Over 300 new ones are created each month First virus was created to show loopholes in software.
  • 15. oComputer Vandalism  Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.  On the Internet, includes acts such as a cracker’s replacing the original Web page with profanity or some racist
  • 16. oCyber Terrorism  Use of internet based attacks in terrorist activities. These terrorists are using 512-bit encryption, which is impossible to decrypt.  Cyber terrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives.  Objectives may be political or ideological since this can be seen as a form of terrorism.
  • 17. oSoftware Privacy  Theft of software through the illegal copying of genuine programs.  Distribution of products intended to pass for the original.  The majority of software today is purchased as a one-site license, meaning that only one computer may have that software installed on it at one time.
  • 18. CYBER CRIMINALS Cyber criminal is an a individual who commits cyber crime where heshe makes use of the computer either as a tool or as a target or as a both. Cybercriminals use computers in three broad ways:  Select computer as their target: These criminals attack other people's computers to perform malicious activities, such as spreading viruses, data theft, identity theft, etc.  Uses computer as their weapon: They use the computer to carry out "conventional crime", such as spam, fraud, illegal gambling, etc.  Uses computer as their accessory: They use the computer to save stolen or illegal data.
  • 19. TYPES OF CYBER CRIMINALS  Script Kiddies  Scammers  Hacker groups  Phishers  Insiders  Cyber terrorists
  • 20. CYBER SECURITY  Cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.  Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
  • 21. NEED OF CYBER SECURITY  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.  Hacking, cracking and other forms of cyber mischief have reached a level of sophistication equalling (and in many cases surpassing) the capability of most organizations to defend against.
  • 22. ADVANTAGES OF CYBER SECURITY  Protects system against viruses, worms, spyware and other unwanted programs.  Protection against data from theft.  Protects the computer from being hacked.  Minimizes computer freezing and crashes.  Gives privacy to users
  • 23. PREVENTION TIPS  Use strong passwords  Install the latest OS updates  Secure your wireless network  Secure your computer by activating firewall and using anti-virus software's  Maintain backups  Check security settings
  • 24. CYBER LAW  Cyber law is an attempt to integrate the challenges presented by human activity on the Internet with legacy system of laws applicable to the physical world.
  • 25. IT ACT PROVISIONS  E-mail would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law.  Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.  Digital signatures have been given legal validity and sanction in the Act.
  • 26. CYBER LAWS AMENDMENTS  INDIAN PENAL CODE,1860  INDIAN EVIDENCE ACT,1872  BANKER’S BOOK EVIDENCE ACT,1891  GENERAL CLAUSES ACT,1897
  • 27. CONCLUSION  Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.  Cybercrime is a major problem – and growing  Cybercrime is about much more than hackers  There is a natural adversarial relationship between IT and police  Successful prosecution of cybercrime must be a team effort  IT personnel must learn investigation and police must learn technology