Your SlideShare is downloading. ×
0
Cybercrime and security
Cybercrime and security
Cybercrime and security
Cybercrime and security
Cybercrime and security
Cybercrime and security
Cybercrime and security
Cybercrime and security
Cybercrime and security
Cybercrime and security
Cybercrime and security
Cybercrime and security
Cybercrime and security
Cybercrime and security
Cybercrime and security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cybercrime and security

503

Published on

Published in: Technology
0 Comments
6 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
503
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
62
Comments
0
Likes
6
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. -Hemant Jakkani -Badruka College HYD (BBCIT)
  • 2.           Cybercrime crimes Cyber security Cybercrime acts Reasons for cybercrime Cyber criminals Mode and manner of committing cybercrime Classification Acts for security Prevention of cybercrime Conclusion
  • 3. CYBERCRIME CRIMES    Crimes may be of many types Criminals use internet to steal personal identity. Mostly phishing and pharming use to fake websites. For example they ask user name, passwords, credit card numbers by creating fake websites.
  • 4. CYBER SECURITY
  • 5. The first act “COMMON WEALTH CYBERCRIME BILL 2001 was approved by the parliament on 27 SEP 2001”.
  • 6.  Capacity to store data in comparatively small space.  Easy to access  Complex  Negligence  Loss of evidence
  • 7. CYBER CRIMINALS 1. 2. 3. 4. Adolescents of age 6-18 years. Organised hackers. Professional hackers/crackers. Discontented employees.
  • 8. A MODE AND MANNER OF COMMITTING CYBER CRIME  By unauthorized access to computer .  Theft of information contained in electronic form.  Email bombing  Data diddling  Salami attacks  Denial of service attack  Virus/worm attacks  Logic bombs  Trojan attacks  Internet time thefts
  • 9. CLASSIFICATION Against individuals Against organization Against society
  • 10. CYBER ACTS FOR SECURITY  Information technology act 2000 is a welcome step when cyber crime came into progress. The various loop holes in the act are 1. Passing act without public debate. 2. Cyber torts. 3. It is neither comprehensive nor exhaustive. 4. Ambiguity in definitions. 5. Uniform law. 6. Lack of awareness
  • 11. PREVENTION OF CYBERCRIME By disclosing your identity to protect from strangers.  Avoid sending photographs.  Always use latest and update anti virus.  Never give your identities to fake websites.  Always keep backup volumes.  Use of firewalls may be beneficial.  Keep watch on the sites that children accessing to prevent harassment in children 
  • 12. CONCLUSION Capacity of human mind is unfathomable.Elimination of cyber crime is impossible in cyber space . A main witness is its history . The main possible step is creating awareness in its duties and rights. I would like to conclude with a word of caution for the prolegislation school that provisions of cyber law are not made stringent that it would effect the growth of industry .

×