2. Introduction
History
Types of cyber crime
Causes
Types of criminals
Cyber laws
Tips to prevent
Cyber security
Advantages of cyber security
Conclusion
3. Cyber crime committed using a computer
and the internet to steal a person’s identity
or illegal imports or malicious programs
.cyber crime is nothing but where the
computer used as an object or subject of
crime.
4.
5. Fraud and financial crimes
Cyber terrorism
Hacking
Computer as a target
Spamming
Obscene or offensive content
Harassment
Child pornography
6. Confidential Information is online
Personally Motivated Cyber Crime
Desire of Making quick money
Passion of youngsters
Negligence
Complexity in understanding
New Form of Crime
Accessibility to Victims
Lack of Evidence
Drawbacks in judiciary system
7. Children and youngsters between the age
group of 6 – 18 years
Expert hackers / crackers
Structured hackers
Dissatisfied employees
8.
9. There are some provisions in the ICT Act,
2006 which mention penalties for various
cyberspace related crimes. For instance,
section 54 (1) of this Act declares the
offences concerning cyberspace. Then,
section-54(2) says, “If any person commits
offences under sub-section (1) of this
section, he shall be punishable with
imprisonment for a term which may extend
to ten years, or with fine which may extend
to taka ten lakhs, or with both”.
10. Secure mobile devices
Protect your Data
Be aware of what you do while using
public Wi-Fi Hotspots
Protect your e-identity
Avoid being scammed
Constantly update passwords and login
details
A secure computer will deter cyber
criminals
11. Computer security, also known as cyber
security or IT security, is the protection of
information systems from theft or damage to
the hardware, the software, and to the
information on them, as well as from
disruption or misdirection of the services
they provide.
It includes controlling physical access to the
hardware, as well as protecting against harm
that may come via network access.
12. Protects system against viruses, worms and
other unwanted programs
Protection against data from theft
Protects the computer from being hacked
It helps us to browse the site and website
It will defend us from hacks and virus
Gives privacy to users
13. The key to protecting yourself is being aware
Not all cybercriminals are hackers
There is a whole other world that exists in
cyberspace…make sure that your information
travels safely
Stay secure , stay safe