SlideShare uma empresa Scribd logo
1 de 31
CYBER SECURITY
ND
CYBERSPACE & CRIMINAL BEHAVIOR
Enrollment no Name
140760106070 Navadiya Dharmik
140760106079 Patel Kevin
Prepared by:
Guided By:
Prof. Mitali H. Desai
(B.E.(I.T.),M.E.(CO))
This PowerPoint Template has clean and neutral design that can be adapted to
any content and meets various market segments. With this many slides you
are able to make a complete PowerPoint Presentation that best suit your
needs.
This PowerPoint Template has clean and neutral design that can be adapted to
any content and meets various market segments. With this many slides you
are able to make a complete PowerPoint Presentation that best suit your
needs.
This PowerPoint Template has clean and neutral design that can be adapted to
any content and meets various market segments. With this many slides you
are able to make a complete PowerPoint Presentation that best suit your
needs.
CONTENT
CYBERSPACE
What is cyberspace?
Cyberspace is a domain characterized by the
use of electronics and the electromagnetic spectrum
to store, modify, and exchange data via networked
systems and associated physical infrastructures. In
effect, cyberspace can be thought of as the intercom-
nection of human beings through computers and
telecommunication, without regard to physical
geography.
The word became popular in the 1990s when
the uses of the Internet, networking, and digital
communication were all growing dramatically and the
term "cyberspace" was able to represent the many
new ideas and phenomena that were emerging.
To us, ‘cyberspace’ was
simply about managing spaces.
There was nothing esoteric about it
. Nothing digital, either. It was just
a tool. The space was concrete,
physical.
The parent term of
cyberspace is "cybernetics",
derived from the Ancient Greek
(kybernētēs, steersman, governor,
pilot), a word introduced by Norbert
Wiener for his pioneering work in
electronic communication and con-
trol science.
There are no shared definitions of cyberspace at
the scientific level and every government uses a
different definition.
“cyberspace is the national environment in
which digitized information is communicated
over computer networks.”
-Dictionary of Militaryand Associated
A global domain within the information
environment consisting of the inter dependent
network of information technology infrastructures in
cluding the Internet, telecommunications networks,
computer systems & and embedded processors
and controllers.
TERMS RELATED CYBERSPACE
CYBER POWER:
The ability to use cyberspace to create advan
tages and influence events in the other operational
environment and across the instruments of power.
INTERNET:
A global computer network providing a variet
y of information and communication facilities, consis
ting of interconnected networks using standardized
communication protocols.
CYBER-ATTACK:
Cyber-attack is any type of offensive maneuver
employed by individuals or whole organizations that
targets computer information systems, infrastructures,
computer networks, and/or personal computer devices
by various means of malicious acts usually originating
from an anonymous source that either steals, alters, or
destroys a specified target by hacking into a susceptibl
e system.
Cyber-attacks can range from installing spywa
re on a PC to attempts to destroy the infrastructure
of entire nations. Cyber-attacks have become increas
ingly sophisticated and dangerous as the Stuxnet wo
rm recently demonstrated.
User behavior analytics and SIEM (Security
information and event management) are used to
prevent these attacks.
There are a number of techniques to utilize in
cyber-attacks and a variety of ways to administer the
m to individuals or establishments on a broader
Scale. Attacks are broken down into two categories,
syntactic attacks and semantic attacks.
Syntactic attacks:
Syntactic attacks are straight forward; it is co
nsidered malicious software which includes viruses,
worms, and Trojan horses.
Semantic attacks:
The use of incorrect information to damage
The credibility of target resources or to cause direct
or indirect harm.
INDIA AND PAKISTAN CYBER
ATTACKS
There were two such instances between India a
nd Pakistan that involved cyberspace conflicts, started i
n 1990s. Earlier cyber attacks came to known as early
as in 1999. Since then, India and Pakistan were engag
ed in a long-term dispute over Kashmir which moved in
to cyberspace. Historical accounts indicated that each
country's hackers have been repeatedly involved in att
acking each other's computing database system. The n
umber of attacks has grown yearly: 45 in 1999, 133 in
2000, 275 by the end of August 2001.
In 2010, Indian hackers
laid a cyber attack at least 36
government database websites
going by the name "Indian Cyber
Army". In 2013, Indian
hackers hacked the official web-
site of Election commission of
Pakistan in an attempt to retrieve
sensitive database information.
In retaliation, Pakistani hackers,
calling themselves "True Cyber
Army" hacked and defaced
~1,059 websites of Indian
election bodies.
Cyber crime:
Cyber crime is an activity done using computers
and internet. We can say that it is an unlawful acts wh
erein the computer either a tool or target or both.
Categories of cyber crime
• The computer as a target :- using a computer to
attacks other computer, e.g. Hacking, virus/worms
attacks, Dos attack etc.
• The computer as a weapon :- using a computer to
commit real world crime e.g. cyber terrorism, credit-
card fraud and pornography etc.
TYPES OF CYBER CRIME
• Hacking
• Child pornography
• Denial of service attacks
• Virus dissemination
• Computer vandalism
• Cyber terrorism
• Software piracy
Indiastands11th intherankingforCyberCrimeintheWorld,constitu
ting3%of theGlobalCyber
Technological advances have imp
acted
criminal behavior in three ways:
1. Mass Communication Technology has transformed
media and popular culture into a powerful influence
on offender behavior.
2. Computer Technology has created new avenues
and different opportunities for criminal behavior.
3. Investigative Technology has altered methods used
by offenders and the types of crimes they engage in
.
Hypotheses in the Research
Literature on the
Influence of Mass Media on
Criminal Behavior
• Pop cultural artifacts are criminogenic contribute to
real-life crime.
• Pop cultural artifacts are cathartic – offer an outlet
for natural aggressive impulses.
The Copycat Phenomenon and
Cultural technological changes m
ay be risk
factors for criminal behavior.
• Cultural technological changes may be risk factors
for criminal behavior.
• Relevance of the copycat phenomenon to all types
of criminal behavior should be revisited.
• Integrative theoretical models offer a foundation for
empirical investigation of copycat crime.
Technology-Related Risk Factors
for Criminal Behavior
• Criminologists can no longer ignore the ways in
which media and computer technology shape
criminal behavior.
• Technology breeds false familiarity, blurs fantasy
and reality, and provides a virtual realm that media-
tes conscience. This has important implications for
the study of criminal behavior.
COPYCAT CRIME:
A crime inspired by another
crime that has been publicized in
the news media or fictionally or
artistically represented whereby
the offender incorporates aspects
of the original offense into a new
crime.
Factors that Influence Copycat Crime
• Individual Criminogenic Factors
• Relationship to Media
• Cultural Factors
• Demographic Factors
• Characteristics Of Media Source
EFFECT OF CYBER ATTACKS
• DEVIANCE AND CRIMINAL SUBCULTURE IN CYBERSPACE
• Internet Gambling
• PERPETRATORS’ PERSPECTIVES AND OFFENDER USE OF T
HE INTERNET
• Identity Construction Among Hackers
• Virtual Sex Offenders:
• Self-Reported Internet Child Pornography Consumers
• Online Social Networking and Pedophilia
• Adult–Child Sex Advocacy Websites as Learning
• Environments for Crime
• The Internet as a Terrorist’s Tool: A Social Learning
• Perspective
• DIGITAL PIRACY
• Value and Choice: Examining Their Roles in Digital
Piracy
• Suing the Genie Back in the Bottle: The Failed RIAA
Strategy to Deter P2P Network Users
• Criminological Predictors of Digital Piracy
• Change of Music Piracy and Neutralization: An Exami
nation Using Short-Term Longitudinal
• Digital File Sharing: An Examination of Neutralization
and Rationalization Techniques Employed by Digital
File Sharers
• CYBER VICTIMIZATION
• Cyber-Routine Activities: Empirical Examination of
Online Lifestyle, Digital Guardians, and Computer
Crime Victimization
• Adolescent Online Victimization and Constructs of
Routine Activities Theory
• Cyber Stalking: Typology, Etiology, and Victims
• Online Social Networking and Women Victims
• Malware Victimization: A Routine Activities
Framework
CYBER SECURITY
RELATIONS BETWEEN THE INTERNET AND
OTHER SEGMENTS OF CYBERSPACE
Cyber security is the protection of info-
rmation systems from theft or damage to the hardware
, the software, and to the information on them, as well
as from disruption or misdirection of the services they
provide.
Cyber security standards which enable organiz-
ations to practice safe security techniques to minimize
the number of successful cyber attacks.
Cyber security refers to the technologies and
processes designed to protect computers, networks
and data from unauthorized access, vulnerabilities and
attacks delivered via the Internet by cyber criminals.
Though, cyber security is important for network,
data and application security.
SAFETY TIPS FOR CYBER CRIME
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen na
me.
• Never give your full username or passwords to
strangers.
• Learn more about Internet privacy.
CYBERSPACE & CRIMINAL BEHAVIOR

Mais conteúdo relacionado

Mais procurados (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Software security
Software securitySoftware security
Software security
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Cia security model
Cia security modelCia security model
Cia security model
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Information Security
Information SecurityInformation Security
Information Security
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Chapter 2 program-security
Chapter 2 program-securityChapter 2 program-security
Chapter 2 program-security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Semelhante a CYBERSPACE & CRIMINAL BEHAVIOR

HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Cyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial ResponseCyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial Responseijtsrd
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
Cyber space & critical information infrastructure
Cyber space & critical information infrastructureCyber space & critical information infrastructure
Cyber space & critical information infrastructureNarayan Joshi
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence AnalysisAshley Thomas
 

Semelhante a CYBERSPACE & CRIMINAL BEHAVIOR (20)

HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial ResponseCyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial Response
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber space & critical information infrastructure
Cyber space & critical information infrastructureCyber space & critical information infrastructure
Cyber space & critical information infrastructure
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence Analysis
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 

Último

₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...SUHANI PANDEY
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 

Último (20)

₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 

CYBERSPACE & CRIMINAL BEHAVIOR

  • 2. CYBERSPACE & CRIMINAL BEHAVIOR Enrollment no Name 140760106070 Navadiya Dharmik 140760106079 Patel Kevin Prepared by: Guided By: Prof. Mitali H. Desai (B.E.(I.T.),M.E.(CO))
  • 3. This PowerPoint Template has clean and neutral design that can be adapted to any content and meets various market segments. With this many slides you are able to make a complete PowerPoint Presentation that best suit your needs. This PowerPoint Template has clean and neutral design that can be adapted to any content and meets various market segments. With this many slides you are able to make a complete PowerPoint Presentation that best suit your needs. This PowerPoint Template has clean and neutral design that can be adapted to any content and meets various market segments. With this many slides you are able to make a complete PowerPoint Presentation that best suit your needs. CONTENT
  • 4. CYBERSPACE What is cyberspace? Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures. In effect, cyberspace can be thought of as the intercom- nection of human beings through computers and telecommunication, without regard to physical geography.
  • 5. The word became popular in the 1990s when the uses of the Internet, networking, and digital communication were all growing dramatically and the term "cyberspace" was able to represent the many new ideas and phenomena that were emerging.
  • 6. To us, ‘cyberspace’ was simply about managing spaces. There was nothing esoteric about it . Nothing digital, either. It was just a tool. The space was concrete, physical. The parent term of cyberspace is "cybernetics", derived from the Ancient Greek (kybernētēs, steersman, governor, pilot), a word introduced by Norbert Wiener for his pioneering work in electronic communication and con- trol science.
  • 7. There are no shared definitions of cyberspace at the scientific level and every government uses a different definition. “cyberspace is the national environment in which digitized information is communicated over computer networks.” -Dictionary of Militaryand Associated A global domain within the information environment consisting of the inter dependent network of information technology infrastructures in cluding the Internet, telecommunications networks, computer systems & and embedded processors and controllers.
  • 8. TERMS RELATED CYBERSPACE CYBER POWER: The ability to use cyberspace to create advan tages and influence events in the other operational environment and across the instruments of power. INTERNET: A global computer network providing a variet y of information and communication facilities, consis ting of interconnected networks using standardized communication protocols.
  • 9. CYBER-ATTACK: Cyber-attack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptibl e system. Cyber-attacks can range from installing spywa re on a PC to attempts to destroy the infrastructure of entire nations. Cyber-attacks have become increas ingly sophisticated and dangerous as the Stuxnet wo rm recently demonstrated.
  • 10. User behavior analytics and SIEM (Security information and event management) are used to prevent these attacks.
  • 11. There are a number of techniques to utilize in cyber-attacks and a variety of ways to administer the m to individuals or establishments on a broader Scale. Attacks are broken down into two categories, syntactic attacks and semantic attacks. Syntactic attacks: Syntactic attacks are straight forward; it is co nsidered malicious software which includes viruses, worms, and Trojan horses. Semantic attacks: The use of incorrect information to damage The credibility of target resources or to cause direct or indirect harm.
  • 12. INDIA AND PAKISTAN CYBER ATTACKS There were two such instances between India a nd Pakistan that involved cyberspace conflicts, started i n 1990s. Earlier cyber attacks came to known as early as in 1999. Since then, India and Pakistan were engag ed in a long-term dispute over Kashmir which moved in to cyberspace. Historical accounts indicated that each country's hackers have been repeatedly involved in att acking each other's computing database system. The n umber of attacks has grown yearly: 45 in 1999, 133 in 2000, 275 by the end of August 2001.
  • 13. In 2010, Indian hackers laid a cyber attack at least 36 government database websites going by the name "Indian Cyber Army". In 2013, Indian hackers hacked the official web- site of Election commission of Pakistan in an attempt to retrieve sensitive database information. In retaliation, Pakistani hackers, calling themselves "True Cyber Army" hacked and defaced ~1,059 websites of Indian election bodies.
  • 14. Cyber crime: Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wh erein the computer either a tool or target or both. Categories of cyber crime • The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. • The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit- card fraud and pornography etc.
  • 15. TYPES OF CYBER CRIME • Hacking • Child pornography • Denial of service attacks • Virus dissemination • Computer vandalism • Cyber terrorism • Software piracy
  • 17. Technological advances have imp acted criminal behavior in three ways: 1. Mass Communication Technology has transformed media and popular culture into a powerful influence on offender behavior. 2. Computer Technology has created new avenues and different opportunities for criminal behavior. 3. Investigative Technology has altered methods used by offenders and the types of crimes they engage in .
  • 18. Hypotheses in the Research Literature on the Influence of Mass Media on Criminal Behavior • Pop cultural artifacts are criminogenic contribute to real-life crime. • Pop cultural artifacts are cathartic – offer an outlet for natural aggressive impulses.
  • 19. The Copycat Phenomenon and Cultural technological changes m ay be risk factors for criminal behavior. • Cultural technological changes may be risk factors for criminal behavior. • Relevance of the copycat phenomenon to all types of criminal behavior should be revisited. • Integrative theoretical models offer a foundation for empirical investigation of copycat crime.
  • 20. Technology-Related Risk Factors for Criminal Behavior • Criminologists can no longer ignore the ways in which media and computer technology shape criminal behavior. • Technology breeds false familiarity, blurs fantasy and reality, and provides a virtual realm that media- tes conscience. This has important implications for the study of criminal behavior.
  • 21. COPYCAT CRIME: A crime inspired by another crime that has been publicized in the news media or fictionally or artistically represented whereby the offender incorporates aspects of the original offense into a new crime.
  • 22. Factors that Influence Copycat Crime • Individual Criminogenic Factors • Relationship to Media • Cultural Factors • Demographic Factors • Characteristics Of Media Source
  • 23. EFFECT OF CYBER ATTACKS • DEVIANCE AND CRIMINAL SUBCULTURE IN CYBERSPACE • Internet Gambling • PERPETRATORS’ PERSPECTIVES AND OFFENDER USE OF T HE INTERNET • Identity Construction Among Hackers • Virtual Sex Offenders: • Self-Reported Internet Child Pornography Consumers • Online Social Networking and Pedophilia • Adult–Child Sex Advocacy Websites as Learning
  • 24. • Environments for Crime • The Internet as a Terrorist’s Tool: A Social Learning • Perspective • DIGITAL PIRACY • Value and Choice: Examining Their Roles in Digital Piracy • Suing the Genie Back in the Bottle: The Failed RIAA Strategy to Deter P2P Network Users • Criminological Predictors of Digital Piracy • Change of Music Piracy and Neutralization: An Exami nation Using Short-Term Longitudinal
  • 25. • Digital File Sharing: An Examination of Neutralization and Rationalization Techniques Employed by Digital File Sharers
  • 26. • CYBER VICTIMIZATION • Cyber-Routine Activities: Empirical Examination of Online Lifestyle, Digital Guardians, and Computer Crime Victimization • Adolescent Online Victimization and Constructs of Routine Activities Theory • Cyber Stalking: Typology, Etiology, and Victims • Online Social Networking and Women Victims • Malware Victimization: A Routine Activities Framework
  • 27.
  • 28. CYBER SECURITY RELATIONS BETWEEN THE INTERNET AND OTHER SEGMENTS OF CYBERSPACE Cyber security is the protection of info- rmation systems from theft or damage to the hardware , the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Cyber security standards which enable organiz- ations to practice safe security techniques to minimize the number of successful cyber attacks.
  • 29. Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals. Though, cyber security is important for network, data and application security.
  • 30. SAFETY TIPS FOR CYBER CRIME • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous - choose a genderless screen na me. • Never give your full username or passwords to strangers. • Learn more about Internet privacy.