SlideShare uma empresa Scribd logo
1 de 29
CYBER CRIME ✔
AND
SECURITY 🔐
PRESNTED BY :- Kartavya Som , Manish Singh,
Ayush Chauhan , Viipin Ranga, Vansh Baliyan , Vansh Malik
CLASS :- X-B
CONTENT
• INTRODUCTION
• DEFINATION
• HISTORY
• CYBER THREAT EVOLUTION
• CATEGORIES OF CYBER CRIME
• PREVENTION
• SECURITY
• CONCLUSION
INTRODUCTIO
N
• Cyber crime is not an old sort of crime to the world. It is
defined as any criminal activity which takes place on or
over the medium of computers or internet or other
technology recognised by the Information Technology
Act. Cyber crime is the most prevalent crime playing a
devastating role in Modern India.
• OR WHAT DO YOU MEAN BY CYBER CRIME ?
• cybercrime, also called computer crime, the use of a
computer as an instrument to further illegal ends,
such as committing fraud, trafficking in child pornography
and intellectual property, stealing identities, or violating
privacy.
DEFINATION
• Cybercrime refers to the use of a computer to
commit a crime. As a criminal activity, it began
when hackers started illegally accessing high-
level computer networks. Some examples of
cybercrime include credit card and identity theft,
network intrusions and software piracy.
• Cybercrime is a crime that involves a computer
and a network. The computer may have been
used in the commission of a crime, or it may be
the target. Cybercrime may harm someone's
security and financial health.
HISTORY
• Cybercrime first started with hackers
trying to break into computer networks.
Some did it just for the thrill of accessing
high-level security networks, but others
sought to gain sensitive, classified
material. ... Computer hackers also
engage in phishing scams, like asking for
bank account numbers, and credit card
theft.
CYBER THREAT
EVOLUTION
• Cyberthreat has been in existence since the
early stages of communication and is
evolving since then with the subsequent
development of technology. From Landline
hacking in the 1970s to cryptojacking in 2021,
cybercrimes tend to become more and more
sophisticated with time. With every passing
decade, the technological society and
cybersecurity professionals find themselves
amidst highly coordinated and relentless
attacks on digital assets and infrastructure,
where the existing solution or defense either
What is cyber crime and
its types ?
• Here are some specific examples of the
different types of cybercrime: Email and
internet fraud. Identity fraud (where
personal information is stolen and used).
Theft of financial or card payment data. ...
Cyberespionage (where hackers access
government or company data).
What Are the Top Five
Cybercrimes?
• #1 Phishing. “Tap on this link and win a
million dollars right away!” Sounds too
good to be true, right? ...
• #2 Cyber Extortion. ...
• #3 Data breach. ...
• #4 Identity theft. ...
• #5 Harassment.
What is cybercrime?
• Cybercrime is criminal activity that
either targets or uses a computer, a
computer network or a networked device.
Most, but not all, cybercrime is committed
by cybercriminals or hackers who want to
make money. Cybercrime is carried out by
individuals or organizations.
What is the introduction of cyber
crime?
• Cyber crime is not an old sort of crime to
the world. It is defined as any criminal
activity which takes place on or over
the medium of computers or internet or
other technology recognised by the
Information Technology Act. Cyber
crime is the most prevalent crime playing a
devastating role in Modern India.
What is the most common cyber
crime ?
• 5 most common types of cybercrimes:
• Phishing scams: ...
• Internet fraud: ...
• Online intellectual property infringements:
...
• Identity theft: ...
• Online harassment and cyberstalking:
Why is it called cyber?
• What does cyber mean? Prior to the
advent of the internet, cyber was used in
the formation of words relating to
computers, computer networks, or
virtual reality. This usage can be traced
to the word cybernetics, which was
ushered into English in the 1940s by the
scientist Norbert Wiener.
How can we stay safe from cyber
crimes?
• Strong Passwords
• Ensure your software is up-to-date. ...
• Don't fall for pop-ups. ...
• Secure your internet network with a strong
encryption password and a VPN. ...
• Manage your social media settings. ...
• Protect yourself from identity threats. ...
• Educate your children about internet risks. ...
• Secure your computer and mobile devices.
What is the punishment of cyber
crime in India?
• Penalties under Cyber Crimes:-
Section 43 and 66 of the IT Act punishes a
person committing data theft, transmitting
virus into a system, hacking, destroying
data, or denying access to the network to
an authorized person with maximum
imprisonment up to 3 years or a fine of
rupees 5 lacs or both.
What is the full form of cyber?
• CYBER Stands For : Changing
Yesterdays Behavior For
Enhanced Results | Childrens
Yearly Best Ever Reads.
What was the first cyber crime?
• 1834 — French Telegraph
System — A pair of thieves hack the
French Telegraph System and steal
financial market information,
effectively conducting the world's first
cyberattack.
How many sections are there in
cyber law?
• This Act has 90 Sections.
AND ALL SECTION ON NEXT PAGE
👍
Cyber law is the part of the overall legal system that deals with the internet, cyberspace,
and their respective legal issues. Cyber law covers a fairly broad area covering several
subtopics including freedom of expression, access to and usage of the internet, and
online privacy. Generically, cyber law is referred to as the Law of the Internet.
Cyber Law is a generic term referring to all the legal and regulatory aspects of the
internet. Everything concerned with or related to or emanating from any legal aspects or
concerning any activities of the citizens in the cyberspace comes within the ambit of
cyber laws. Cyber law covers legal issues which are related to the use of communicative,
transactional, and distributive aspects of network information technologies and devices.
It encompasses the legal, statutory, and constitutional provisions which affect computers
and networks.
History
The Information Technology Act, 2000 came into force on 17 October 2000. This Act applies to whole of India, and its provisions also apply to any
offense or contravention, committed even outside the territorial jurisdiction of Republic of India, by any person irrespective of his nationality. In order to
attract provisions of this Act, such an offence or contravention should involve a computer, computer system, or computer network located in India. The
IT Act 2000 provides an extraterritorial applicability to its provisions by virtue of Section 1(2) read with Section 75. This Act has 90 Sections.
India's The Information Technology Act 2000 has tried to assimilate legal principles available in several such laws (relating to information technology)
enacted earlier in several other countries, as also various guidelines pertaining to information technology law. The Act gives legal validity to electronic
contracts, recognition of electronic signatures. This is a modern legislation which makes acts like hacking, data theft, spreading of virus, identity theft,
defamation (sending offensive messages) pornography, child pornography, cyber terrorism, a criminal offence.
The Act is supplemented by a number of rules which includes rules for cyber cafes,
electronic service delivery, data security, blocking of websites. It also has rules for
observance of due diligence by internet intermediaries (ISP's, network service providers,
cyber cafes, etc.). Any person affected by data theft, hacking, spreading of viruses can
apply for compensation from Adjudicator appointed under Section 46 as well as file a
criminal complaint. Appeal from adjudicator lies to Cyber Appellate Tribunal.
Offences
Section 65 - Tampering with computer source documents
If a person knowingly or intentionally conceals, destroys or alters or intentionally or
knowingly causes another to conceal, destroy or alter any computer source code used for
a computer, computer programme, computer system or computer network, when the
computer source code is required to be kept or maintained by law for the time being in
force.
Penalty - Imprisonment up to three years, or/and with fine up to RS 200,000
Section 66 – Hacking with computer system
If a person with the intent to cause or knowing that he is likely to cause wrongful loss or
damage to the public or any person destroys or deletes or alters any information residing
in a computer resource or diminishes its value or utility or affects it injuriously by any
means, commits hack.
Penalty - Imprisonment up to three years, or/and with fine up to RS 500,000
Section 66B - Receiving stolen computer or communication device
A person receives or retains a computer resource or communication device which is
known to be stolen or the person has reason to believe is stolen.
Penalty - Imprisonment up to three years, or/and with fine up to RS 100,000
Section 66C – Using password of another person
A person fraudulently uses the password, digital signature or other unique identification
of another person.
Penalty - Imprisonment up to three years, or/and with fine up to RS 100,000
Section 66D – Cheating using computer resource
If a person cheats someone using a computer resource or communication.
Penalty - Imprisonment up to three years, or/and with fine up to RS 100,000
Section 66E – Publishing private images of others
If a person captures, transmits or publishes images of a person's private parts without
his/her consent or knowledge.
Penalty - Imprisonment up to three years, or/and with fine up to RS 200,000
Section 66F – Act of cyber terrorism
If a person denies access to authorized personnel to a computer resource, accesses a
protected system or introduces contaminant into a system, with the intention of
threatening the unity, integrity, sovereignty or security of India, then he commits cyber
terrorism.
Section 67 - Publishing information which is obscene in e-form
If a person publishes or transmits or causes to be published in the electronic form, any
material which is lascivious or appeals to the prurient interest or if its effect is such as to
tend to deprave and corrupt persons who are likely, having regard to all relevant
circumstances, to read, see or hear the matter contained or embodied in it.
Penalty - Imprisonment up to five years, or/and with fine up to RS 1,000,000
Section 67A - Publishing images containing sexual acts
If a person publishes or transmits images containing a sexual explicit act or conduct.
Penalty- Imprisonment up to seven years, or/and with fine up to RS 1,000,000
Section 67B – Publishing child porn or predating children online
If a person captures, publishes or transmits images of a child in a sexually explicit act or
conduct. If a person induces a child into a sexual act. A child is defined as anyone under 18.
Penalty- Imprisonment up to five years, or/and with fine up to RS 1,000,000 on first
conviction. Imprisonment up to seven years, or/and with fine up to RS 1,000,000 on second
conviction.
Section 67C - Failure to maintain records
Persons deemed as intermediary (such as an ISP) must maintain required records for
stipulated time. Failure is an offence.
Penalty- Imprisonment up to three years, or/and with fine.
Section 69 - Failure/refusal to decrypt data
If the Controller is satisfied that it is necessary or expedient so to do in the interest of
the sovereignty or integrity of India, the security of the State, friendly relations with
foreign States or public order or for preventing incitement to the commission of any
cognizable offence, for reasons to be recorded in writing, by order, direct any agency of
the Government to intercept any information transmitted through any computer
resource. The subscriber or any person in charge of the computer resource shall, when
called upon by any agency which has been directed, must extend all facilities and
technical assistance to decrypt the information. The subscriber or any person who fails
to assist the agency referred is deemed to have committed a crime.
Penalty- Imprisonment up to seven years and possible fine.
Section 66A
In September 2012, a freelance cartoonist Aseem Trivedi was arrested under the Section 66A of
the IT Act, Section 2 of Prevention of Insults to National Honor Act, 1971 and for sedition under
the Section 124 of the Indian Penal Code. His cartoons depicting widespread corruption in India
were considered offensive.
On 12 April 2012, a Chemistry professor from Jadavpur University, Ambikesh Mahapatra, was
arrested for sharing a cartoon of West Bengal Chief Minister Mamata Banerjee and then Railway
Minister Mukul Roy. The email was sent from the email address of a housing society. Subrata
Sengupta, the secretary of the housing society, was also arrested. They were charged under
Section 66A and B of the IT Act, for defamation under Sections 500, for obscene gesture to a
woman under Section 509, and abetting a crime under Section 114 of the Indian Penal Code.
On 30 October 2012, a Pondicherry businessman Ravi Srinivasan was arrested under Section
66A. He had sent tweet accusing Karti Chidambaram, son of then Finance Minister P.
Chidambaram, of corruption. Karti Chidambaram had complained to the police.
On 19 November 2012, a 21-year-old girl was arrested from Palghar for posting a message on
Face book criticizing the shutdown in Mumbai for the funeral of Bal Thackeray. Another 20-year-
old girl was arrested for "liking" the post. They were initially charged under Section 295A of the
Indian Penal Code (hurting religious sentiments) and Section 66A of the IT Act. Later, Section
295A was replaced by Section 505(2) (promoting enmity between classes). A group of Shiv Sena
workers vandalised a hospital run by the uncle of one of girls.
CATEGORIES OF CYBER
CRIME
• DDoS Attacks. These are used to make an
online service unavailable and take the
network down by overwhelming the site with
traffic from a variety of sources. ...
• Botnets. ...
• Identity Theft. ...
• Cyberstalking. ...
• Social Engineering. ...
• PUPs. ...
• Phishing. ...
• Prohibited/Illegal Content.
PREVENTION
• Download applications from trusted
sources. Keep your applications and
operating system (e.g. Windows, Mac,
Linux) current with the latest system
updates. Turn on automatic updates to
prevent potential attacks on older
software. Make regular back-ups of all
your important data, and store it in another
location.
Cyber security
• Cyber security is the application of
technologies, processes and controls to
protect systems, networks, programs,
devices and data from cyber attacks.
• It aims to reduce the risk of cyber
attacks and protect against the
unauthorised exploitation of systems,
networks and technologies.
CONCLUSION
• Though not all people are victims to cyber
crimes, they are still at risk. Crimes by
computer vary, and they don�t always occur
behind the computer, but they executed by
computer. The hacker�s identity is ranged
between 12 years young to 67years old. The
hacker could live three continents away from
its victim, and they wouldn�t even know they
were being hacked. Crimes done behind the
computer are the 21st century�s problem.
With the technology increasing, criminals
don�t have to rob banks, nor do they have
to be outside in order to commit any crime.
They have everything they need on their lap.
THIS PPT IS DONE WITH HELP OF :- KARTAVYA SOM,MANISH SINGH,AYUSH CHAUHAN,
VANSH BALIYAN,VANSH MALIK (NEW),VIPIN RANGA
OF CLASS:- X-B ✔
FOLLOW ME :- 👍👍

Mais conteúdo relacionado

Mais procurados

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Mais procurados (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Semelhante a Cyber crime ✔

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 

Semelhante a Cyber crime ✔ (20)

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
English in written
English in writtenEnglish in written
English in written
 

Último

Nehru Nagar, Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genui...
Nehru Nagar, Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genui...Nehru Nagar, Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genui...
Nehru Nagar, Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genui...
delhimunirka15
 
Engineering Major for College_ Environmental Health Engineering by Slidesgo.pptx
Engineering Major for College_ Environmental Health Engineering by Slidesgo.pptxEngineering Major for College_ Environmental Health Engineering by Slidesgo.pptx
Engineering Major for College_ Environmental Health Engineering by Slidesgo.pptx
DanielRemache4
 
codes and conventions of film magazine and website.pptx
codes and conventions of film magazine and website.pptxcodes and conventions of film magazine and website.pptx
codes and conventions of film magazine and website.pptx
17duffyc
 
9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi
9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi
9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi
delhimunirka15
 
Museum of fine arts Lauren Simpson…………..
Museum of fine arts Lauren Simpson…………..Museum of fine arts Lauren Simpson…………..
Museum of fine arts Lauren Simpson…………..
mvxpw22gfc
 
WhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) Delhi
WhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) DelhiWhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) Delhi
WhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) Delhi
delhimunirka15
 
Mussafah Call Girls +971525373611 Call Girls in Mussafah Abu Dhabi
Mussafah Call Girls +971525373611 Call Girls in Mussafah Abu DhabiMussafah Call Girls +971525373611 Call Girls in Mussafah Abu Dhabi
Mussafah Call Girls +971525373611 Call Girls in Mussafah Abu Dhabi
romeke1848
 
Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155
Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155
Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155
SaketCallGirlsCallUs
 

Último (20)

Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...
Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...
Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...
 
Nehru Nagar, Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genui...
Nehru Nagar, Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genui...Nehru Nagar, Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genui...
Nehru Nagar, Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genui...
 
THE ARTS OF THE PHILIPPINE BALLET PRESN
THE ARTS OF  THE PHILIPPINE BALLET PRESNTHE ARTS OF  THE PHILIPPINE BALLET PRESN
THE ARTS OF THE PHILIPPINE BALLET PRESN
 
HUMA Final Presentation About Chicano Culture
HUMA Final Presentation About Chicano CultureHUMA Final Presentation About Chicano Culture
HUMA Final Presentation About Chicano Culture
 
Engineering Major for College_ Environmental Health Engineering by Slidesgo.pptx
Engineering Major for College_ Environmental Health Engineering by Slidesgo.pptxEngineering Major for College_ Environmental Health Engineering by Slidesgo.pptx
Engineering Major for College_ Environmental Health Engineering by Slidesgo.pptx
 
codes and conventions of film magazine and website.pptx
codes and conventions of film magazine and website.pptxcodes and conventions of film magazine and website.pptx
codes and conventions of film magazine and website.pptx
 
9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi
9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi
9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi
 
Orai call girls 📞 8617370543At Low Cost Cash Payment Booking
Orai call girls 📞 8617370543At Low Cost Cash Payment BookingOrai call girls 📞 8617370543At Low Cost Cash Payment Booking
Orai call girls 📞 8617370543At Low Cost Cash Payment Booking
 
Sonbhadra Escorts 📞 8617370543 | Sonbhadra Call Girls
Sonbhadra  Escorts 📞 8617370543 | Sonbhadra Call GirlsSonbhadra  Escorts 📞 8617370543 | Sonbhadra Call Girls
Sonbhadra Escorts 📞 8617370543 | Sonbhadra Call Girls
 
Museum of fine arts Lauren Simpson…………..
Museum of fine arts Lauren Simpson…………..Museum of fine arts Lauren Simpson…………..
Museum of fine arts Lauren Simpson…………..
 
Completed Event Presentation for Huma 1305
Completed Event Presentation for Huma 1305Completed Event Presentation for Huma 1305
Completed Event Presentation for Huma 1305
 
WhatsApp Chat: 📞 8617370543 Call Girls In Siddharth Nagar At Low Cost Cash Pa...
WhatsApp Chat: 📞 8617370543 Call Girls In Siddharth Nagar At Low Cost Cash Pa...WhatsApp Chat: 📞 8617370543 Call Girls In Siddharth Nagar At Low Cost Cash Pa...
WhatsApp Chat: 📞 8617370543 Call Girls In Siddharth Nagar At Low Cost Cash Pa...
 
WhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) Delhi
WhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) DelhiWhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) Delhi
WhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) Delhi
 
Jaro je tady - Spring is here (Judith) 3
Jaro je tady - Spring is here (Judith) 3Jaro je tady - Spring is here (Judith) 3
Jaro je tady - Spring is here (Judith) 3
 
SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)
SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)
SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)
 
Call Girls Ahwa Just Call 📞 8617370543 Top Class Call Girl Service Available
Call Girls Ahwa Just Call 📞 8617370543 Top Class Call Girl Service AvailableCall Girls Ahwa Just Call 📞 8617370543 Top Class Call Girl Service Available
Call Girls Ahwa Just Call 📞 8617370543 Top Class Call Girl Service Available
 
Just Call Vip call girls Farrukhabad Escorts ☎️8617370543 Two shot with one g...
Just Call Vip call girls Farrukhabad Escorts ☎️8617370543 Two shot with one g...Just Call Vip call girls Farrukhabad Escorts ☎️8617370543 Two shot with one g...
Just Call Vip call girls Farrukhabad Escorts ☎️8617370543 Two shot with one g...
 
Mussafah Call Girls +971525373611 Call Girls in Mussafah Abu Dhabi
Mussafah Call Girls +971525373611 Call Girls in Mussafah Abu DhabiMussafah Call Girls +971525373611 Call Girls in Mussafah Abu Dhabi
Mussafah Call Girls +971525373611 Call Girls in Mussafah Abu Dhabi
 
Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155
Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155
Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155
 
Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...
Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...
Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...
 

Cyber crime ✔

  • 1. CYBER CRIME ✔ AND SECURITY 🔐 PRESNTED BY :- Kartavya Som , Manish Singh, Ayush Chauhan , Viipin Ranga, Vansh Baliyan , Vansh Malik CLASS :- X-B
  • 2. CONTENT • INTRODUCTION • DEFINATION • HISTORY • CYBER THREAT EVOLUTION • CATEGORIES OF CYBER CRIME • PREVENTION • SECURITY • CONCLUSION
  • 3. INTRODUCTIO N • Cyber crime is not an old sort of crime to the world. It is defined as any criminal activity which takes place on or over the medium of computers or internet or other technology recognised by the Information Technology Act. Cyber crime is the most prevalent crime playing a devastating role in Modern India. • OR WHAT DO YOU MEAN BY CYBER CRIME ? • cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.
  • 4. DEFINATION • Cybercrime refers to the use of a computer to commit a crime. As a criminal activity, it began when hackers started illegally accessing high- level computer networks. Some examples of cybercrime include credit card and identity theft, network intrusions and software piracy. • Cybercrime is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may harm someone's security and financial health.
  • 5. HISTORY • Cybercrime first started with hackers trying to break into computer networks. Some did it just for the thrill of accessing high-level security networks, but others sought to gain sensitive, classified material. ... Computer hackers also engage in phishing scams, like asking for bank account numbers, and credit card theft.
  • 6. CYBER THREAT EVOLUTION • Cyberthreat has been in existence since the early stages of communication and is evolving since then with the subsequent development of technology. From Landline hacking in the 1970s to cryptojacking in 2021, cybercrimes tend to become more and more sophisticated with time. With every passing decade, the technological society and cybersecurity professionals find themselves amidst highly coordinated and relentless attacks on digital assets and infrastructure, where the existing solution or defense either
  • 7. What is cyber crime and its types ? • Here are some specific examples of the different types of cybercrime: Email and internet fraud. Identity fraud (where personal information is stolen and used). Theft of financial or card payment data. ... Cyberespionage (where hackers access government or company data).
  • 8. What Are the Top Five Cybercrimes? • #1 Phishing. “Tap on this link and win a million dollars right away!” Sounds too good to be true, right? ... • #2 Cyber Extortion. ... • #3 Data breach. ... • #4 Identity theft. ... • #5 Harassment.
  • 9. What is cybercrime? • Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations.
  • 10. What is the introduction of cyber crime? • Cyber crime is not an old sort of crime to the world. It is defined as any criminal activity which takes place on or over the medium of computers or internet or other technology recognised by the Information Technology Act. Cyber crime is the most prevalent crime playing a devastating role in Modern India.
  • 11. What is the most common cyber crime ? • 5 most common types of cybercrimes: • Phishing scams: ... • Internet fraud: ... • Online intellectual property infringements: ... • Identity theft: ... • Online harassment and cyberstalking:
  • 12. Why is it called cyber? • What does cyber mean? Prior to the advent of the internet, cyber was used in the formation of words relating to computers, computer networks, or virtual reality. This usage can be traced to the word cybernetics, which was ushered into English in the 1940s by the scientist Norbert Wiener.
  • 13. How can we stay safe from cyber crimes? • Strong Passwords • Ensure your software is up-to-date. ... • Don't fall for pop-ups. ... • Secure your internet network with a strong encryption password and a VPN. ... • Manage your social media settings. ... • Protect yourself from identity threats. ... • Educate your children about internet risks. ... • Secure your computer and mobile devices.
  • 14. What is the punishment of cyber crime in India? • Penalties under Cyber Crimes:- Section 43 and 66 of the IT Act punishes a person committing data theft, transmitting virus into a system, hacking, destroying data, or denying access to the network to an authorized person with maximum imprisonment up to 3 years or a fine of rupees 5 lacs or both.
  • 15. What is the full form of cyber? • CYBER Stands For : Changing Yesterdays Behavior For Enhanced Results | Childrens Yearly Best Ever Reads.
  • 16. What was the first cyber crime? • 1834 — French Telegraph System — A pair of thieves hack the French Telegraph System and steal financial market information, effectively conducting the world's first cyberattack.
  • 17. How many sections are there in cyber law? • This Act has 90 Sections. AND ALL SECTION ON NEXT PAGE 👍
  • 18. Cyber law is the part of the overall legal system that deals with the internet, cyberspace, and their respective legal issues. Cyber law covers a fairly broad area covering several subtopics including freedom of expression, access to and usage of the internet, and online privacy. Generically, cyber law is referred to as the Law of the Internet. Cyber Law is a generic term referring to all the legal and regulatory aspects of the internet. Everything concerned with or related to or emanating from any legal aspects or concerning any activities of the citizens in the cyberspace comes within the ambit of cyber laws. Cyber law covers legal issues which are related to the use of communicative, transactional, and distributive aspects of network information technologies and devices. It encompasses the legal, statutory, and constitutional provisions which affect computers and networks. History The Information Technology Act, 2000 came into force on 17 October 2000. This Act applies to whole of India, and its provisions also apply to any offense or contravention, committed even outside the territorial jurisdiction of Republic of India, by any person irrespective of his nationality. In order to attract provisions of this Act, such an offence or contravention should involve a computer, computer system, or computer network located in India. The IT Act 2000 provides an extraterritorial applicability to its provisions by virtue of Section 1(2) read with Section 75. This Act has 90 Sections. India's The Information Technology Act 2000 has tried to assimilate legal principles available in several such laws (relating to information technology) enacted earlier in several other countries, as also various guidelines pertaining to information technology law. The Act gives legal validity to electronic contracts, recognition of electronic signatures. This is a modern legislation which makes acts like hacking, data theft, spreading of virus, identity theft, defamation (sending offensive messages) pornography, child pornography, cyber terrorism, a criminal offence.
  • 19. The Act is supplemented by a number of rules which includes rules for cyber cafes, electronic service delivery, data security, blocking of websites. It also has rules for observance of due diligence by internet intermediaries (ISP's, network service providers, cyber cafes, etc.). Any person affected by data theft, hacking, spreading of viruses can apply for compensation from Adjudicator appointed under Section 46 as well as file a criminal complaint. Appeal from adjudicator lies to Cyber Appellate Tribunal. Offences Section 65 - Tampering with computer source documents If a person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force. Penalty - Imprisonment up to three years, or/and with fine up to RS 200,000 Section 66 – Hacking with computer system If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack. Penalty - Imprisonment up to three years, or/and with fine up to RS 500,000
  • 20. Section 66B - Receiving stolen computer or communication device A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen. Penalty - Imprisonment up to three years, or/and with fine up to RS 100,000 Section 66C – Using password of another person A person fraudulently uses the password, digital signature or other unique identification of another person. Penalty - Imprisonment up to three years, or/and with fine up to RS 100,000 Section 66D – Cheating using computer resource If a person cheats someone using a computer resource or communication. Penalty - Imprisonment up to three years, or/and with fine up to RS 100,000 Section 66E – Publishing private images of others If a person captures, transmits or publishes images of a person's private parts without his/her consent or knowledge. Penalty - Imprisonment up to three years, or/and with fine up to RS 200,000 Section 66F – Act of cyber terrorism If a person denies access to authorized personnel to a computer resource, accesses a protected system or introduces contaminant into a system, with the intention of threatening the unity, integrity, sovereignty or security of India, then he commits cyber terrorism.
  • 21. Section 67 - Publishing information which is obscene in e-form If a person publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it. Penalty - Imprisonment up to five years, or/and with fine up to RS 1,000,000 Section 67A - Publishing images containing sexual acts If a person publishes or transmits images containing a sexual explicit act or conduct. Penalty- Imprisonment up to seven years, or/and with fine up to RS 1,000,000 Section 67B – Publishing child porn or predating children online If a person captures, publishes or transmits images of a child in a sexually explicit act or conduct. If a person induces a child into a sexual act. A child is defined as anyone under 18. Penalty- Imprisonment up to five years, or/and with fine up to RS 1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to RS 1,000,000 on second conviction. Section 67C - Failure to maintain records Persons deemed as intermediary (such as an ISP) must maintain required records for stipulated time. Failure is an offence. Penalty- Imprisonment up to three years, or/and with fine.
  • 22. Section 69 - Failure/refusal to decrypt data If the Controller is satisfied that it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence, for reasons to be recorded in writing, by order, direct any agency of the Government to intercept any information transmitted through any computer resource. The subscriber or any person in charge of the computer resource shall, when called upon by any agency which has been directed, must extend all facilities and technical assistance to decrypt the information. The subscriber or any person who fails to assist the agency referred is deemed to have committed a crime. Penalty- Imprisonment up to seven years and possible fine.
  • 23. Section 66A In September 2012, a freelance cartoonist Aseem Trivedi was arrested under the Section 66A of the IT Act, Section 2 of Prevention of Insults to National Honor Act, 1971 and for sedition under the Section 124 of the Indian Penal Code. His cartoons depicting widespread corruption in India were considered offensive. On 12 April 2012, a Chemistry professor from Jadavpur University, Ambikesh Mahapatra, was arrested for sharing a cartoon of West Bengal Chief Minister Mamata Banerjee and then Railway Minister Mukul Roy. The email was sent from the email address of a housing society. Subrata Sengupta, the secretary of the housing society, was also arrested. They were charged under Section 66A and B of the IT Act, for defamation under Sections 500, for obscene gesture to a woman under Section 509, and abetting a crime under Section 114 of the Indian Penal Code. On 30 October 2012, a Pondicherry businessman Ravi Srinivasan was arrested under Section 66A. He had sent tweet accusing Karti Chidambaram, son of then Finance Minister P. Chidambaram, of corruption. Karti Chidambaram had complained to the police. On 19 November 2012, a 21-year-old girl was arrested from Palghar for posting a message on Face book criticizing the shutdown in Mumbai for the funeral of Bal Thackeray. Another 20-year- old girl was arrested for "liking" the post. They were initially charged under Section 295A of the Indian Penal Code (hurting religious sentiments) and Section 66A of the IT Act. Later, Section 295A was replaced by Section 505(2) (promoting enmity between classes). A group of Shiv Sena workers vandalised a hospital run by the uncle of one of girls.
  • 24. CATEGORIES OF CYBER CRIME • DDoS Attacks. These are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources. ... • Botnets. ... • Identity Theft. ... • Cyberstalking. ... • Social Engineering. ... • PUPs. ... • Phishing. ... • Prohibited/Illegal Content.
  • 25. PREVENTION • Download applications from trusted sources. Keep your applications and operating system (e.g. Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to prevent potential attacks on older software. Make regular back-ups of all your important data, and store it in another location.
  • 26. Cyber security • Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. • It aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks and technologies.
  • 27. CONCLUSION • Though not all people are victims to cyber crimes, they are still at risk. Crimes by computer vary, and they don�t always occur behind the computer, but they executed by computer. The hacker�s identity is ranged between 12 years young to 67years old. The hacker could live three continents away from its victim, and they wouldn�t even know they were being hacked. Crimes done behind the computer are the 21st century�s problem. With the technology increasing, criminals don�t have to rob banks, nor do they have to be outside in order to commit any crime. They have everything they need on their lap.
  • 28. THIS PPT IS DONE WITH HELP OF :- KARTAVYA SOM,MANISH SINGH,AYUSH CHAUHAN, VANSH BALIYAN,VANSH MALIK (NEW),VIPIN RANGA OF CLASS:- X-B ✔
  • 29. FOLLOW ME :- 👍👍