SlideShare a Scribd company logo
1 of 3
A SEMINAR REPORT

                                             ON

                       CYBER CRIME AND SECURITY



          FOR PARTIAL FULFILLMENT OF THE DEGREE
                        BACHELOR OF TECHNOLOGY
                                    UNDER RTU, KOTA




                                       Session 2009-2013

SUBMITTED TO:                                              SUBMITTED BY:

Mr. Sameer Chandra                                         Shishupal Nagar

(Lecturer , Dept. of Computer Sc.)                         (09EJCCS100)

Mrs. Honey Saxena
(Lecturer, Dept. of Computer Sc.)



       DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
              Jaipur Engineering College & Research Centre
                       SitapuraTonk Road, Jaipur
                                               I
ACKNOWLEDGEMENT


I take this opportunity to express my sincere thanks and deep gratitude to all those
people who extended their wholehearted co-operation and have helped me to
shape the paper in systematic way.

      I am highly indebted and graceful toMr. Sameer Chandra (Sen. Lecturer at
JECRC) and Mr. MuktBihari( HOD Computer science) for their strict
supervision, constant encouragement, inspiration and guidance, which ensure the
worthiness of my work. Working under them was a rich experience.

      I also thank to and Mrs. Honey Saxena (Lecturer at JECRC), I am
extremely grateful and indebted to him expert, sincere and valuable guidance and
encouragement extended to me .
.
       I also take this opportunity to record my sincere thanks to all the faculty
members of the department(Computer Science) for their help and encouragement.
I also thank my parents for their unceasing encouragement and support.




                                                                          Signature
                                                                (Shishupal Nagar)




                                         II
PAGE INDEX

S.No.                         TOPIC   PAGE NO.
 1.     Abstract                         1
 2.     Introduction                     2
 4.     Cyber Law of India               3
 5.     Technical Aspects                4
 6.     Conventional Crime               5

 7.     What is Cyber Crime              6

 8.     Types of Cyber crime             7

 9.     History                          8

 10.    Reasons for cyber crime          9

 11     Cyber Criminals                  13

 12     Classification                   15

 13     Statutory Provision              19

 14     Prevention of Cyber Crime        24

 13.    Conclusion                       25
 14.    References                       26




                                III

More Related Content

Similar to Initial pages

1. ncrisetm 2017 brochure - copy
1. ncrisetm 2017 brochure - copy1. ncrisetm 2017 brochure - copy
1. ncrisetm 2017 brochure - copyProf(Dr) A.K. SINGH
 
1. NCRISETM-2017 brochure - Copy
1. NCRISETM-2017 brochure - Copy1. NCRISETM-2017 brochure - Copy
1. NCRISETM-2017 brochure - CopyDR A.K. SINGH
 
NBA power point presentation final copy y
NBA power point presentation final copy yNBA power point presentation final copy y
NBA power point presentation final copy ysrajece
 
Meerut Institute of Engineering.docx
Meerut Institute of Engineering.docxMeerut Institute of Engineering.docx
Meerut Institute of Engineering.docxArcadePrinters
 
123 241-1-sm-seacma2013
123 241-1-sm-seacma2013123 241-1-sm-seacma2013
123 241-1-sm-seacma2013Dynes Navianti
 
Artificial intelligence in civil engineering
Artificial intelligence in civil engineering Artificial intelligence in civil engineering
Artificial intelligence in civil engineering Aseena Latheef
 
Sensor Cloud Infrastructure - Small Survey Report
Sensor Cloud Infrastructure - Small Survey ReportSensor Cloud Infrastructure - Small Survey Report
Sensor Cloud Infrastructure - Small Survey ReportVintesh Patel
 
International journal of latest Trends in Engineering and Technology
International journal of latest Trends in Engineering and TechnologyInternational journal of latest Trends in Engineering and Technology
International journal of latest Trends in Engineering and Technologypriyanka singh
 
Seminar report of mems
Seminar report of memsSeminar report of mems
Seminar report of memsGovind kumawat
 
first_ppt[1] (1).pptx
first_ppt[1] (1).pptxfirst_ppt[1] (1).pptx
first_ppt[1] (1).pptxRITHESHKT1
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...Munisekhar Gunapati
 
A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...IJECEIAES
 
Seminar report of mems
Seminar report of memsSeminar report of mems
Seminar report of memsGovind kumawat
 
Networks, Deep Learning and COVID-19
Networks, Deep Learning and COVID-19Networks, Deep Learning and COVID-19
Networks, Deep Learning and COVID-19tm1966
 
Simulation of induction motor for reference of practical engineering
Simulation of induction motor for reference of practical engineeringSimulation of induction motor for reference of practical engineering
Simulation of induction motor for reference of practical engineeringvivatechijri
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
 

Similar to Initial pages (20)

1. ncrisetm 2017 brochure - copy
1. ncrisetm 2017 brochure - copy1. ncrisetm 2017 brochure - copy
1. ncrisetm 2017 brochure - copy
 
1. NCRISETM-2017 brochure - Copy
1. NCRISETM-2017 brochure - Copy1. NCRISETM-2017 brochure - Copy
1. NCRISETM-2017 brochure - Copy
 
NBA power point presentation final copy y
NBA power point presentation final copy yNBA power point presentation final copy y
NBA power point presentation final copy y
 
Meerut Institute of Engineering.docx
Meerut Institute of Engineering.docxMeerut Institute of Engineering.docx
Meerut Institute of Engineering.docx
 
123 241-1-sm-seacma2013
123 241-1-sm-seacma2013123 241-1-sm-seacma2013
123 241-1-sm-seacma2013
 
Artificial intelligence in civil engineering
Artificial intelligence in civil engineering Artificial intelligence in civil engineering
Artificial intelligence in civil engineering
 
Sensor Cloud Infrastructure - Small Survey Report
Sensor Cloud Infrastructure - Small Survey ReportSensor Cloud Infrastructure - Small Survey Report
Sensor Cloud Infrastructure - Small Survey Report
 
International journal of latest Trends in Engineering and Technology
International journal of latest Trends in Engineering and TechnologyInternational journal of latest Trends in Engineering and Technology
International journal of latest Trends in Engineering and Technology
 
Seminar report of mems
Seminar report of memsSeminar report of mems
Seminar report of mems
 
Loyalty_Card Report
Loyalty_Card ReportLoyalty_Card Report
Loyalty_Card Report
 
first_ppt[1] (1).pptx
first_ppt[1] (1).pptxfirst_ppt[1] (1).pptx
first_ppt[1] (1).pptx
 
Avinash thesis final
Avinash thesis finalAvinash thesis final
Avinash thesis final
 
RESUME
RESUMERESUME
RESUME
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
 
A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...
 
Seminar report of mems
Seminar report of memsSeminar report of mems
Seminar report of mems
 
Networks, Deep Learning and COVID-19
Networks, Deep Learning and COVID-19Networks, Deep Learning and COVID-19
Networks, Deep Learning and COVID-19
 
Simulation of induction motor for reference of practical engineering
Simulation of induction motor for reference of practical engineeringSimulation of induction motor for reference of practical engineering
Simulation of induction motor for reference of practical engineering
 
Profile of Dr. Brojo Kishore Mishra
Profile of Dr. Brojo Kishore MishraProfile of Dr. Brojo Kishore Mishra
Profile of Dr. Brojo Kishore Mishra
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
 

Initial pages

  • 1. A SEMINAR REPORT ON CYBER CRIME AND SECURITY FOR PARTIAL FULFILLMENT OF THE DEGREE BACHELOR OF TECHNOLOGY UNDER RTU, KOTA Session 2009-2013 SUBMITTED TO: SUBMITTED BY: Mr. Sameer Chandra Shishupal Nagar (Lecturer , Dept. of Computer Sc.) (09EJCCS100) Mrs. Honey Saxena (Lecturer, Dept. of Computer Sc.) DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Jaipur Engineering College & Research Centre SitapuraTonk Road, Jaipur I
  • 2. ACKNOWLEDGEMENT I take this opportunity to express my sincere thanks and deep gratitude to all those people who extended their wholehearted co-operation and have helped me to shape the paper in systematic way. I am highly indebted and graceful toMr. Sameer Chandra (Sen. Lecturer at JECRC) and Mr. MuktBihari( HOD Computer science) for their strict supervision, constant encouragement, inspiration and guidance, which ensure the worthiness of my work. Working under them was a rich experience. I also thank to and Mrs. Honey Saxena (Lecturer at JECRC), I am extremely grateful and indebted to him expert, sincere and valuable guidance and encouragement extended to me . . I also take this opportunity to record my sincere thanks to all the faculty members of the department(Computer Science) for their help and encouragement. I also thank my parents for their unceasing encouragement and support. Signature (Shishupal Nagar) II
  • 3. PAGE INDEX S.No. TOPIC PAGE NO. 1. Abstract 1 2. Introduction 2 4. Cyber Law of India 3 5. Technical Aspects 4 6. Conventional Crime 5 7. What is Cyber Crime 6 8. Types of Cyber crime 7 9. History 8 10. Reasons for cyber crime 9 11 Cyber Criminals 13 12 Classification 15 13 Statutory Provision 19 14 Prevention of Cyber Crime 24 13. Conclusion 25 14. References 26 III