SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
CYBER CRIME
Presentation on
Submitted to :-
Mrs. Kritika Pahuja
Submitted By :-
Neeraj Kumar Ahirwar
MBA FT (5 YEARS) VI SEM
Roll no. 1967
CONTENT
1. What is Cyber Crime
2. History of Cyber Crime
3. Categories of Cyber Crime
4. Types of Cyber Crime
5. Motives of Cyber Criminals
6. Safety tips for Cyber Crime6. Safety tips for Cyber Crime
7. Cyber Security
8. Advantages of Cyber Security
9. Disadvantages of Cyber Security
10. Cyber Law
11. Objectives of Cyber Law
12. Cyber Law in India
13. Conclusion
WHAT IS CYBER CRIME
Cybercrime is a crime that involves a computer and a
network. It is also known as computer-oriented crime.
Cybercrime can be defined as a crime in which a computer is
the object of crime (hacking, phishing, spamming) or is usedthe object of crime (hacking, phishing, spamming) or is used
as a tool to commit an offense (child pornography, hate
crimes).
Cybercriminals may use computer technology to access
personal information, business trade secrets or use the
internet for exploitation trade secrets or use the internet for
exploitative or malicious purposes.
HISTORY OF CYBER CRIME
 The first cyber crime ever recorded was in France
during 1820
 The person involved was Joseph- Marie. He was a
textile manufacturer and he invented looms that can
store design.store design.
 The first spam email took place in the year 1978
when it was sent out over the Arpanet.
 The first virus was installed on Apple Computer in
the year 1982 when a high school student ‘Rich
Skrenta’ developed the EIK Cloner.
 A sixteen years old student nicknamed ‘data stream’,
arrested by UK police in 1994
 India is the third-most targeted country for Phishing
attacks after the US and the UK.
 Social networks as well as ecommerce sites are major
targets.
 India is the number one country in the world for generating
spams.
 Denial of Service (DOS) attacks by ‘Mafia Boy’ on eBay, Denial of Service (DOS) attacks by ‘Mafia Boy’ on eBay,
Yahoo, and other popular sites in 2000.
 FBI’s email system was hacked in February, 2005.
 Travelling documents of NATO forces were hacked in
Afghanistan.
CATEGORIES OF CYBER CRIME
Cyber crime
Against Person Against Property Against Government
 Cyber crimes against persons :- Crimes that happen in
the Cyber space against persons include various crimes
such as transmission of child-pornography, cyber
harassment, cyber stalking, cyber bullying, cyber
defamation, revenge porn, email spoofing, cracking,
carding, sms spoofing, pornography, credit card frauds,
online libel / slander, cyber smearing, trafficking,
financial frauds, identity theft, etc.
 Cyber crimes against property :- Cyber crimes
against property includes computer vandalism,
IPR violations, cyber squatting, typo squatting,
cyber trespass, DDOS attacks, worm attacks,
hacking, transmitting viruses, intellectual
property theft, infringement, etc.
 Cyber crimes against government :- Cyber crimes Cyber crimes against government :- Cyber crimes
against government are serious in nature as it is
considered as an act of war against the
Sovereignty. Cyber crimes such as cyber
terrorism, cyber warfare, pirated software,
possessing of unauthorized information, hacking
into confidential military data are some of the
real dangers that Governments face these days.
Cyberextortion
Cryptojacking
Identity theft
TYPES OF CYBER CRIME
Credit card fraud
Cyber Espionage
Software piracy
Exit scam
Phishing
Malware
1. Cyberextortion :- It is a form of online crime which occurs
when a person uses the internet to demand money or
other goods or behaviour (such as sex), from another
person by threatening to inflict harm to his person, his
reputation, or his property.
2. Cryptojacking :- Its is an emerging form of malware that
hides on your device and steals its computing resources inhides on your device and steals its computing resources in
order to min for valuable online currencies like Bit coin.
3. Identity theft :- Identity theft is the act of a person
obtaining information illegally about someone else. Thief's
try to find such information as full name, maiden name,
address, date of birth, social security number, password,
email, credit card number etc.
4. Credit card fraud :- An attack that occurs when hacker
secretly gain access on retailer’s systems to get the credit
card or banking information of their customers and after
that attacker uses that credit card to purchase something
of high value.
5. Cyber Espionage :- A crime involving a cybercriminals
who hacks into systems or networks to gain access to
confidential information held by a government or otherconfidential information held by a government or other
organization. It can be done to gather data or destroy data
or to access over CCTV cameras.
6. Software piracy :- An attack that involves the unlawful
copying, distribution and use of software programs with
the intention of commercial or personal use. Trademark
violations, copyright infringements and patent violations
are often associated with this type of cybercrime.
7. Exit scam :- The dark web has given rise to the digital
version of an old crime known as the exit scam. Dark web
administrators divert virtual currency held in
marketplace into their own accounts.
8. Phishing :- The fraudulent practice of sending emails
purporting to be from reputable companies in order to
induce individual to reveal personal information, such asinduce individual to reveal personal information, such as
passwords and credit card numbers.
9. Malware :- Malware is a program or file that is harmful to
a computer viruses, Trojan horses and spyware. These
malicious program can perform a variety of different
functions such as stealing, deleting sensitive data,
encrypting or monitoring users activity.
MOTIVES OF CYBER CRIMINALS
Profit Revenge
Desire for
entertainment
Profit
Political
agenda
Psychiatric
illness
Sexual
motivations
Revenge
Motives of
Cyber Criminals
SAFETY TIPS FOR CYBER CRIME
 Use antivirus software's
 Insert firewall
 Uninstall unnecessary software
 Maintain backup Maintain backup
 Check security settings
 Never give your full name or address to strangers
 Learn more about internet privacy
 Avoid clicking on unnecessary advertisement
 Keep your system updated for latest security version.
CYBER SECURITY
Cyber security refers to set of rules and regulation which are
used for protecting the network, data and program from
malicious attack. The core functionality of cyber security
includes to protect the system and data from various cyber
threats or cyber security crimes. Cyber security is the practicethreats or cyber security crimes. Cyber security is the practice
of protecting system, program and network from various
types of network attacks.
There are various forms of cyber threats such as malware,
malicious application, phishing and exploit kits. These types
of cyber security attacks are usually aimed at accessing,
destroying and altering the sensitive data of the user
ADVANTAGES OF CYBER SECURITY
Some advantages of cyber security are as follows :-
 It provides protection against worms, viruses, spyware
and other unwanted programs.
 It provides protection from data theft as with the It provides protection from data theft as with the
implementation high-security protocol malicious user
cannot break the network architecture.
 Protect the system from hacking.
 Provide data and system privacy. This can be achieved
with the good implementation of security policies and
protocols in the network.
DISADVANTAGES OF CYBER
SECURITY
Some disadvantages of cyber security are as follows :-
 Rules of the firewall are difficult to configure correctly.
 Makes the system week or sometime too much security Makes the system week or sometime too much security
can backfire
 It is costly for the average
 Incorrect firewalls rules block the user from accessing
various services of the network.
CYBER LAWS
Cyber law is a term that encapsulates the legal issues related
to use of the internet. It is also known as Internet law.
It Is less a distinct field of law than intellectual property or
contract law, as its domain covering many areas of law and
regulation.
Some leading topics include internet access and usage, privacy,
freedom of expression, and jurisdiction.
In simple words, cyber law can be considered as a part of the
overall legal system that deals with the Internet, E-commerce,
digital contracts, electronics evidence, cyberspace, and their
respective legal issues.
OBJECTIVES OF CYBER LAW
The aim and objectives of the Cyber Law are as follows :-
 To create more awareness about cyber legal issues and
challenges
 To provide advice, inputs as also guidance to people on To provide advice, inputs as also guidance to people on
their day-to-day legal issues concerning the use of
cyberspace
 To work on research and development on cutting-edge
issues and challenges in cyberspace
 To contribute to the global debate on evolving Cyber law
jurisprudence
 According to Cyber Law, any company can store their data
in electronic storage.
 To coordinate with other concerned stakeholders in the
digital environment so as to contribute to the evolving Cyber
law jurisprudence
 To provide legal assistance and advice to people, who have
been affected by misuse of cyberspace and connected
services
 To stop computer crime and protect privacy of internet
users.users.
 To provide facility of filling document online relating to
school admission or registration in employment exchange.
 To give legal recognition to digital signature for accepting
any agreement via computer.
 To make more power to IPO, RBI and Indian Evidence act
for restricting electronic crime.
CYBER LAWS IN INDIA
 India has enacted the first I.T. Act, 2000 based on the
UNCIRAL model recommended by the general
assembly of the United Nations.
 Offences under IT acts are:
Tampering with computer source document Tampering with computer source document
 Hacking with computer systems, data alterations
 Publishing obscene information
 Un-authorized access to protected systems
 Breach of confidentiality and privacy
 Publishing false digital signature certificates
CONCLUSION
By exercising common sense and following security best
practices, users can protect against phishing attacks, Ransom
ware, malware, identity theft, scams, and some of the other
most common types of cyber crime.
But as we all know, nothing is stagnant on the web.
Cybercrime is continually evolving, which is whyCybercrime is continually evolving, which is why
organizations must continually train their employees and
help them build upon their awareness of IT security threats.
DONT CLICK ON
UNWANTED SITES
AND
ADVERTISMENTS
THANK
Y UY U

Mais conteúdo relacionado

Mais procurados (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 

Semelhante a Cyber Crime and Security ppt by Neeraj Ahirwar

Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesVivekanandaGN1
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 

Semelhante a Cyber Crime and Security ppt by Neeraj Ahirwar (20)

Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 

Último

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Último (20)

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 

Cyber Crime and Security ppt by Neeraj Ahirwar

  • 1. CYBER CRIME Presentation on Submitted to :- Mrs. Kritika Pahuja Submitted By :- Neeraj Kumar Ahirwar MBA FT (5 YEARS) VI SEM Roll no. 1967
  • 2. CONTENT 1. What is Cyber Crime 2. History of Cyber Crime 3. Categories of Cyber Crime 4. Types of Cyber Crime 5. Motives of Cyber Criminals 6. Safety tips for Cyber Crime6. Safety tips for Cyber Crime 7. Cyber Security 8. Advantages of Cyber Security 9. Disadvantages of Cyber Security 10. Cyber Law 11. Objectives of Cyber Law 12. Cyber Law in India 13. Conclusion
  • 3. WHAT IS CYBER CRIME Cybercrime is a crime that involves a computer and a network. It is also known as computer-oriented crime. Cybercrime can be defined as a crime in which a computer is the object of crime (hacking, phishing, spamming) or is usedthe object of crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitation trade secrets or use the internet for exploitative or malicious purposes.
  • 4. HISTORY OF CYBER CRIME  The first cyber crime ever recorded was in France during 1820  The person involved was Joseph- Marie. He was a textile manufacturer and he invented looms that can store design.store design.  The first spam email took place in the year 1978 when it was sent out over the Arpanet.  The first virus was installed on Apple Computer in the year 1982 when a high school student ‘Rich Skrenta’ developed the EIK Cloner.  A sixteen years old student nicknamed ‘data stream’, arrested by UK police in 1994
  • 5.  India is the third-most targeted country for Phishing attacks after the US and the UK.  Social networks as well as ecommerce sites are major targets.  India is the number one country in the world for generating spams.  Denial of Service (DOS) attacks by ‘Mafia Boy’ on eBay, Denial of Service (DOS) attacks by ‘Mafia Boy’ on eBay, Yahoo, and other popular sites in 2000.  FBI’s email system was hacked in February, 2005.  Travelling documents of NATO forces were hacked in Afghanistan.
  • 6. CATEGORIES OF CYBER CRIME Cyber crime Against Person Against Property Against Government  Cyber crimes against persons :- Crimes that happen in the Cyber space against persons include various crimes such as transmission of child-pornography, cyber harassment, cyber stalking, cyber bullying, cyber defamation, revenge porn, email spoofing, cracking, carding, sms spoofing, pornography, credit card frauds, online libel / slander, cyber smearing, trafficking, financial frauds, identity theft, etc.
  • 7.  Cyber crimes against property :- Cyber crimes against property includes computer vandalism, IPR violations, cyber squatting, typo squatting, cyber trespass, DDOS attacks, worm attacks, hacking, transmitting viruses, intellectual property theft, infringement, etc.  Cyber crimes against government :- Cyber crimes Cyber crimes against government :- Cyber crimes against government are serious in nature as it is considered as an act of war against the Sovereignty. Cyber crimes such as cyber terrorism, cyber warfare, pirated software, possessing of unauthorized information, hacking into confidential military data are some of the real dangers that Governments face these days.
  • 8. Cyberextortion Cryptojacking Identity theft TYPES OF CYBER CRIME Credit card fraud Cyber Espionage Software piracy Exit scam Phishing Malware
  • 9. 1. Cyberextortion :- It is a form of online crime which occurs when a person uses the internet to demand money or other goods or behaviour (such as sex), from another person by threatening to inflict harm to his person, his reputation, or his property. 2. Cryptojacking :- Its is an emerging form of malware that hides on your device and steals its computing resources inhides on your device and steals its computing resources in order to min for valuable online currencies like Bit coin. 3. Identity theft :- Identity theft is the act of a person obtaining information illegally about someone else. Thief's try to find such information as full name, maiden name, address, date of birth, social security number, password, email, credit card number etc.
  • 10. 4. Credit card fraud :- An attack that occurs when hacker secretly gain access on retailer’s systems to get the credit card or banking information of their customers and after that attacker uses that credit card to purchase something of high value. 5. Cyber Espionage :- A crime involving a cybercriminals who hacks into systems or networks to gain access to confidential information held by a government or otherconfidential information held by a government or other organization. It can be done to gather data or destroy data or to access over CCTV cameras. 6. Software piracy :- An attack that involves the unlawful copying, distribution and use of software programs with the intention of commercial or personal use. Trademark violations, copyright infringements and patent violations are often associated with this type of cybercrime.
  • 11. 7. Exit scam :- The dark web has given rise to the digital version of an old crime known as the exit scam. Dark web administrators divert virtual currency held in marketplace into their own accounts. 8. Phishing :- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individual to reveal personal information, such asinduce individual to reveal personal information, such as passwords and credit card numbers. 9. Malware :- Malware is a program or file that is harmful to a computer viruses, Trojan horses and spyware. These malicious program can perform a variety of different functions such as stealing, deleting sensitive data, encrypting or monitoring users activity.
  • 12. MOTIVES OF CYBER CRIMINALS Profit Revenge Desire for entertainment Profit Political agenda Psychiatric illness Sexual motivations Revenge Motives of Cyber Criminals
  • 13. SAFETY TIPS FOR CYBER CRIME  Use antivirus software's  Insert firewall  Uninstall unnecessary software  Maintain backup Maintain backup  Check security settings  Never give your full name or address to strangers  Learn more about internet privacy  Avoid clicking on unnecessary advertisement  Keep your system updated for latest security version.
  • 14. CYBER SECURITY Cyber security refers to set of rules and regulation which are used for protecting the network, data and program from malicious attack. The core functionality of cyber security includes to protect the system and data from various cyber threats or cyber security crimes. Cyber security is the practicethreats or cyber security crimes. Cyber security is the practice of protecting system, program and network from various types of network attacks. There are various forms of cyber threats such as malware, malicious application, phishing and exploit kits. These types of cyber security attacks are usually aimed at accessing, destroying and altering the sensitive data of the user
  • 15. ADVANTAGES OF CYBER SECURITY Some advantages of cyber security are as follows :-  It provides protection against worms, viruses, spyware and other unwanted programs.  It provides protection from data theft as with the It provides protection from data theft as with the implementation high-security protocol malicious user cannot break the network architecture.  Protect the system from hacking.  Provide data and system privacy. This can be achieved with the good implementation of security policies and protocols in the network.
  • 16. DISADVANTAGES OF CYBER SECURITY Some disadvantages of cyber security are as follows :-  Rules of the firewall are difficult to configure correctly.  Makes the system week or sometime too much security Makes the system week or sometime too much security can backfire  It is costly for the average  Incorrect firewalls rules block the user from accessing various services of the network.
  • 17. CYBER LAWS Cyber law is a term that encapsulates the legal issues related to use of the internet. It is also known as Internet law. It Is less a distinct field of law than intellectual property or contract law, as its domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression, and jurisdiction. In simple words, cyber law can be considered as a part of the overall legal system that deals with the Internet, E-commerce, digital contracts, electronics evidence, cyberspace, and their respective legal issues.
  • 18. OBJECTIVES OF CYBER LAW The aim and objectives of the Cyber Law are as follows :-  To create more awareness about cyber legal issues and challenges  To provide advice, inputs as also guidance to people on To provide advice, inputs as also guidance to people on their day-to-day legal issues concerning the use of cyberspace  To work on research and development on cutting-edge issues and challenges in cyberspace  To contribute to the global debate on evolving Cyber law jurisprudence  According to Cyber Law, any company can store their data in electronic storage.
  • 19.  To coordinate with other concerned stakeholders in the digital environment so as to contribute to the evolving Cyber law jurisprudence  To provide legal assistance and advice to people, who have been affected by misuse of cyberspace and connected services  To stop computer crime and protect privacy of internet users.users.  To provide facility of filling document online relating to school admission or registration in employment exchange.  To give legal recognition to digital signature for accepting any agreement via computer.  To make more power to IPO, RBI and Indian Evidence act for restricting electronic crime.
  • 20. CYBER LAWS IN INDIA  India has enacted the first I.T. Act, 2000 based on the UNCIRAL model recommended by the general assembly of the United Nations.  Offences under IT acts are: Tampering with computer source document Tampering with computer source document  Hacking with computer systems, data alterations  Publishing obscene information  Un-authorized access to protected systems  Breach of confidentiality and privacy  Publishing false digital signature certificates
  • 21. CONCLUSION By exercising common sense and following security best practices, users can protect against phishing attacks, Ransom ware, malware, identity theft, scams, and some of the other most common types of cyber crime. But as we all know, nothing is stagnant on the web. Cybercrime is continually evolving, which is whyCybercrime is continually evolving, which is why organizations must continually train their employees and help them build upon their awareness of IT security threats. DONT CLICK ON UNWANTED SITES AND ADVERTISMENTS