content explained:-
what is cyber crime
history
categories
types
motives
safety tips
cyber security
advantages and disadvantages
cyber law
cyber law objectives
cyber law in india
conclusion
2. CONTENT
1. What is Cyber Crime
2. History of Cyber Crime
3. Categories of Cyber Crime
4. Types of Cyber Crime
5. Motives of Cyber Criminals
6. Safety tips for Cyber Crime6. Safety tips for Cyber Crime
7. Cyber Security
8. Advantages of Cyber Security
9. Disadvantages of Cyber Security
10. Cyber Law
11. Objectives of Cyber Law
12. Cyber Law in India
13. Conclusion
3. WHAT IS CYBER CRIME
Cybercrime is a crime that involves a computer and a
network. It is also known as computer-oriented crime.
Cybercrime can be defined as a crime in which a computer is
the object of crime (hacking, phishing, spamming) or is usedthe object of crime (hacking, phishing, spamming) or is used
as a tool to commit an offense (child pornography, hate
crimes).
Cybercriminals may use computer technology to access
personal information, business trade secrets or use the
internet for exploitation trade secrets or use the internet for
exploitative or malicious purposes.
4. HISTORY OF CYBER CRIME
The first cyber crime ever recorded was in France
during 1820
The person involved was Joseph- Marie. He was a
textile manufacturer and he invented looms that can
store design.store design.
The first spam email took place in the year 1978
when it was sent out over the Arpanet.
The first virus was installed on Apple Computer in
the year 1982 when a high school student ‘Rich
Skrenta’ developed the EIK Cloner.
A sixteen years old student nicknamed ‘data stream’,
arrested by UK police in 1994
5. India is the third-most targeted country for Phishing
attacks after the US and the UK.
Social networks as well as ecommerce sites are major
targets.
India is the number one country in the world for generating
spams.
Denial of Service (DOS) attacks by ‘Mafia Boy’ on eBay, Denial of Service (DOS) attacks by ‘Mafia Boy’ on eBay,
Yahoo, and other popular sites in 2000.
FBI’s email system was hacked in February, 2005.
Travelling documents of NATO forces were hacked in
Afghanistan.
6. CATEGORIES OF CYBER CRIME
Cyber crime
Against Person Against Property Against Government
Cyber crimes against persons :- Crimes that happen in
the Cyber space against persons include various crimes
such as transmission of child-pornography, cyber
harassment, cyber stalking, cyber bullying, cyber
defamation, revenge porn, email spoofing, cracking,
carding, sms spoofing, pornography, credit card frauds,
online libel / slander, cyber smearing, trafficking,
financial frauds, identity theft, etc.
7. Cyber crimes against property :- Cyber crimes
against property includes computer vandalism,
IPR violations, cyber squatting, typo squatting,
cyber trespass, DDOS attacks, worm attacks,
hacking, transmitting viruses, intellectual
property theft, infringement, etc.
Cyber crimes against government :- Cyber crimes Cyber crimes against government :- Cyber crimes
against government are serious in nature as it is
considered as an act of war against the
Sovereignty. Cyber crimes such as cyber
terrorism, cyber warfare, pirated software,
possessing of unauthorized information, hacking
into confidential military data are some of the
real dangers that Governments face these days.
9. 1. Cyberextortion :- It is a form of online crime which occurs
when a person uses the internet to demand money or
other goods or behaviour (such as sex), from another
person by threatening to inflict harm to his person, his
reputation, or his property.
2. Cryptojacking :- Its is an emerging form of malware that
hides on your device and steals its computing resources inhides on your device and steals its computing resources in
order to min for valuable online currencies like Bit coin.
3. Identity theft :- Identity theft is the act of a person
obtaining information illegally about someone else. Thief's
try to find such information as full name, maiden name,
address, date of birth, social security number, password,
email, credit card number etc.
10. 4. Credit card fraud :- An attack that occurs when hacker
secretly gain access on retailer’s systems to get the credit
card or banking information of their customers and after
that attacker uses that credit card to purchase something
of high value.
5. Cyber Espionage :- A crime involving a cybercriminals
who hacks into systems or networks to gain access to
confidential information held by a government or otherconfidential information held by a government or other
organization. It can be done to gather data or destroy data
or to access over CCTV cameras.
6. Software piracy :- An attack that involves the unlawful
copying, distribution and use of software programs with
the intention of commercial or personal use. Trademark
violations, copyright infringements and patent violations
are often associated with this type of cybercrime.
11. 7. Exit scam :- The dark web has given rise to the digital
version of an old crime known as the exit scam. Dark web
administrators divert virtual currency held in
marketplace into their own accounts.
8. Phishing :- The fraudulent practice of sending emails
purporting to be from reputable companies in order to
induce individual to reveal personal information, such asinduce individual to reveal personal information, such as
passwords and credit card numbers.
9. Malware :- Malware is a program or file that is harmful to
a computer viruses, Trojan horses and spyware. These
malicious program can perform a variety of different
functions such as stealing, deleting sensitive data,
encrypting or monitoring users activity.
12. MOTIVES OF CYBER CRIMINALS
Profit Revenge
Desire for
entertainment
Profit
Political
agenda
Psychiatric
illness
Sexual
motivations
Revenge
Motives of
Cyber Criminals
13. SAFETY TIPS FOR CYBER CRIME
Use antivirus software's
Insert firewall
Uninstall unnecessary software
Maintain backup Maintain backup
Check security settings
Never give your full name or address to strangers
Learn more about internet privacy
Avoid clicking on unnecessary advertisement
Keep your system updated for latest security version.
14. CYBER SECURITY
Cyber security refers to set of rules and regulation which are
used for protecting the network, data and program from
malicious attack. The core functionality of cyber security
includes to protect the system and data from various cyber
threats or cyber security crimes. Cyber security is the practicethreats or cyber security crimes. Cyber security is the practice
of protecting system, program and network from various
types of network attacks.
There are various forms of cyber threats such as malware,
malicious application, phishing and exploit kits. These types
of cyber security attacks are usually aimed at accessing,
destroying and altering the sensitive data of the user
15. ADVANTAGES OF CYBER SECURITY
Some advantages of cyber security are as follows :-
It provides protection against worms, viruses, spyware
and other unwanted programs.
It provides protection from data theft as with the It provides protection from data theft as with the
implementation high-security protocol malicious user
cannot break the network architecture.
Protect the system from hacking.
Provide data and system privacy. This can be achieved
with the good implementation of security policies and
protocols in the network.
16. DISADVANTAGES OF CYBER
SECURITY
Some disadvantages of cyber security are as follows :-
Rules of the firewall are difficult to configure correctly.
Makes the system week or sometime too much security Makes the system week or sometime too much security
can backfire
It is costly for the average
Incorrect firewalls rules block the user from accessing
various services of the network.
17. CYBER LAWS
Cyber law is a term that encapsulates the legal issues related
to use of the internet. It is also known as Internet law.
It Is less a distinct field of law than intellectual property or
contract law, as its domain covering many areas of law and
regulation.
Some leading topics include internet access and usage, privacy,
freedom of expression, and jurisdiction.
In simple words, cyber law can be considered as a part of the
overall legal system that deals with the Internet, E-commerce,
digital contracts, electronics evidence, cyberspace, and their
respective legal issues.
18. OBJECTIVES OF CYBER LAW
The aim and objectives of the Cyber Law are as follows :-
To create more awareness about cyber legal issues and
challenges
To provide advice, inputs as also guidance to people on To provide advice, inputs as also guidance to people on
their day-to-day legal issues concerning the use of
cyberspace
To work on research and development on cutting-edge
issues and challenges in cyberspace
To contribute to the global debate on evolving Cyber law
jurisprudence
According to Cyber Law, any company can store their data
in electronic storage.
19. To coordinate with other concerned stakeholders in the
digital environment so as to contribute to the evolving Cyber
law jurisprudence
To provide legal assistance and advice to people, who have
been affected by misuse of cyberspace and connected
services
To stop computer crime and protect privacy of internet
users.users.
To provide facility of filling document online relating to
school admission or registration in employment exchange.
To give legal recognition to digital signature for accepting
any agreement via computer.
To make more power to IPO, RBI and Indian Evidence act
for restricting electronic crime.
20. CYBER LAWS IN INDIA
India has enacted the first I.T. Act, 2000 based on the
UNCIRAL model recommended by the general
assembly of the United Nations.
Offences under IT acts are:
Tampering with computer source document Tampering with computer source document
Hacking with computer systems, data alterations
Publishing obscene information
Un-authorized access to protected systems
Breach of confidentiality and privacy
Publishing false digital signature certificates
21. CONCLUSION
By exercising common sense and following security best
practices, users can protect against phishing attacks, Ransom
ware, malware, identity theft, scams, and some of the other
most common types of cyber crime.
But as we all know, nothing is stagnant on the web.
Cybercrime is continually evolving, which is whyCybercrime is continually evolving, which is why
organizations must continually train their employees and
help them build upon their awareness of IT security threats.
DONT CLICK ON
UNWANTED SITES
AND
ADVERTISMENTS