SlideShare a Scribd company logo
1 of 17
Information Communication technology has become an integral part of our day to day
life. It has just transformed the way we communicate; make friends, share updates,
play games, and do shopping and so on. The technology has impacted most aspect of
our day to day life.
Our new generation is getting exposure to cyber space at a very young age. More and
more people are investing time online to play games, makes friends, and use social
networking sites and so on. In fact with smart phones access to social networking,
online games, shopping etc. has increased significantly. The cyber space connects us
virtually with crores of online users from across the globe. With increasing use of
cyber space, cybercrimes are also increasing rapidly.
The term “cyberspace” was first used by the cyberpunk science fiction
author William Gibson.
Cyberspace is the electronic medium of computer networks, in which
online communication taken place and where individuals can interact,
exchange ideas, share information, provide social support, conduct
business, direct actions, create artistic media, play games, engage in
political discussion, and so on.
The first recorded cybercrime took place in the year 1820.
Cyber Crime may be said to be those species of which, genus is the
conventional crime, and where either the computer is an object or
subject of the constituting crime.
According to UNO Expert recommendations, the term of
“cybercrimes” covers any crime committed by using computer
system or networks, within their framework or against them.
US Department of Justice broadly refers to cyber crimes as “forms
of crimes that involve computers and networks”.
Professor S.T. Viswanathan has given three definitions in his book The Indian Cyber
Laws with Cyber Glossary is as follows -
“Any illegal action in which a computer is the tool or object of the crime i.e. any
crime, the means or purpose of which is to influence the function of a computer”.
“Any incident associated with computer technology in which a victim suffered or
could have suffered loss and a perpetrator, by intention, made or could have made
a gain”
“Computer abuse is considered as any illegal, unethical or unauthorized behavior
relating to the automatic processing and transmission of data.”
In simple words Cyber Crime means unlawful acts wherein the computer is
either a tool or a target or both.
1. Cyber Crime against Individual
2. Cyber Crime against Property
3. Cyber Crime against Organization
4. Cyber Crime against Society at large
 Harassment via e-mail
 Cyber Stalking
 Dissemination of Obscene materials
 Defamation
 Unauthorise Access of computer system
 E-mail spoofing
 Cheating & Fraud
 Computer Vandalism
 Transmitting Virus
 Intellectual Property Crimes
 Internet time theft
 Unauthorise access over Computer System/Hacking
 Denial of Service
 Email bombing
 Salami Attack
 Logic bomb
 Trojan Horse
 Data Diddling
 Cyber Pornography
 Financial Crimes
 Cyber Terrorism
 Sale of illegal Articles
 Online Gambling
 Forgery
 Information Technology Act 2000
Sec. 65, Sec. 66, Sec. 66B, Sec. 65C, Sec. 66 D Sec. 66E
Sec. 66F Sec. 67 Sec. 67A Sec. 67B Sec. 67C Sec. 68 69
Sec. 69A Sec. 69B Sec. 70A Sec. 70B Sec. 71, Sec. 72, Sec.
72A, Sec. 73 , Sec. 74
 Indian Penal Code 1860
Sec. 503, Sec. 499, Sec. 463, Sec. 420, Sec. 463, Sec. 383,
Sec.500
 Online Defamation
SMC Pneumatics (India) Pvt ltd v Jogesh Kwata
Shreya Singhal v. UOI
 Data mining or corporate espionage
Abhinav Gupta v. State of Haryana
 Phishing
Shri Umashankar Sivasubramanian v. ICICI Bank
 Cyber stalking
Unknown v. Jawaharlal Nehru University
 Computer Forgery
Abdul Kareem Telgi scam
Parliament Attack case
 Hate Speech
Sandeep Varghese v. State of Kerala
 Piracy of music, films and other
copyrighted materials
Supercasette Industries v. My space inc
 1) Education
 2) Use a firewall
 3) Click with caution
 4) Practice safe surfing
 5) Practice safe shopping
 6) Use comprehensive security software and keep your system updated
 7) Secure your wireless network
 8) Use strong passwords
 9) Use common sense
 10) Be suspicious
 11) Block spyware attacks
 12) Be Social-Media Savvy
 13) Secure your Mobile Devices
 14) Protect your Data
 15) Protect your e-identity
 16) Avoid being scammed
 17) Call the right person for help
 18) National Cyber Crime Reporting Portal:
https://cybercrime.gov.in/
The Information Technology Act 2000 incorporates within
its understanding the various cyber offences that the world
is under the threat of in the contemporary era. Proper and
timely implementation of the Act may help to curb the
cyber menace and also make the cyber space a more
secure, safe and easy space for storage, transactions and
definitely sharing. Its proper interpretation and
implementation is what is the need of the hour.
“Be Safe, Brows Safe,
Be Cyber Smart,
Be Cyber Safe.”
Cyber crimes its classifications and preventions

More Related Content

What's hot

Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
Deniz Cengiz
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
Whitney Bolton
 

What's hot (20)

Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security (Ways to protect yourself on the internet)
Cyber Crime and Security (Ways to protect yourself on the internet)Cyber Crime and Security (Ways to protect yourself on the internet)
Cyber Crime and Security (Ways to protect yourself on the internet)
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school level
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 

Similar to Cyber crimes its classifications and preventions

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 

Similar to Cyber crimes its classifications and preventions (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 

Recently uploaded

Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
A AA
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 

Recently uploaded (20)

IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 

Cyber crimes its classifications and preventions

  • 1.
  • 2. Information Communication technology has become an integral part of our day to day life. It has just transformed the way we communicate; make friends, share updates, play games, and do shopping and so on. The technology has impacted most aspect of our day to day life. Our new generation is getting exposure to cyber space at a very young age. More and more people are investing time online to play games, makes friends, and use social networking sites and so on. In fact with smart phones access to social networking, online games, shopping etc. has increased significantly. The cyber space connects us virtually with crores of online users from across the globe. With increasing use of cyber space, cybercrimes are also increasing rapidly.
  • 3. The term “cyberspace” was first used by the cyberpunk science fiction author William Gibson. Cyberspace is the electronic medium of computer networks, in which online communication taken place and where individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on.
  • 4. The first recorded cybercrime took place in the year 1820. Cyber Crime may be said to be those species of which, genus is the conventional crime, and where either the computer is an object or subject of the constituting crime. According to UNO Expert recommendations, the term of “cybercrimes” covers any crime committed by using computer system or networks, within their framework or against them. US Department of Justice broadly refers to cyber crimes as “forms of crimes that involve computers and networks”.
  • 5. Professor S.T. Viswanathan has given three definitions in his book The Indian Cyber Laws with Cyber Glossary is as follows - “Any illegal action in which a computer is the tool or object of the crime i.e. any crime, the means or purpose of which is to influence the function of a computer”. “Any incident associated with computer technology in which a victim suffered or could have suffered loss and a perpetrator, by intention, made or could have made a gain” “Computer abuse is considered as any illegal, unethical or unauthorized behavior relating to the automatic processing and transmission of data.” In simple words Cyber Crime means unlawful acts wherein the computer is either a tool or a target or both.
  • 6. 1. Cyber Crime against Individual 2. Cyber Crime against Property 3. Cyber Crime against Organization 4. Cyber Crime against Society at large
  • 7.  Harassment via e-mail  Cyber Stalking  Dissemination of Obscene materials  Defamation  Unauthorise Access of computer system  E-mail spoofing  Cheating & Fraud
  • 8.  Computer Vandalism  Transmitting Virus  Intellectual Property Crimes  Internet time theft
  • 9.  Unauthorise access over Computer System/Hacking  Denial of Service  Email bombing  Salami Attack  Logic bomb  Trojan Horse  Data Diddling
  • 10.  Cyber Pornography  Financial Crimes  Cyber Terrorism  Sale of illegal Articles  Online Gambling  Forgery
  • 11.  Information Technology Act 2000 Sec. 65, Sec. 66, Sec. 66B, Sec. 65C, Sec. 66 D Sec. 66E Sec. 66F Sec. 67 Sec. 67A Sec. 67B Sec. 67C Sec. 68 69 Sec. 69A Sec. 69B Sec. 70A Sec. 70B Sec. 71, Sec. 72, Sec. 72A, Sec. 73 , Sec. 74  Indian Penal Code 1860 Sec. 503, Sec. 499, Sec. 463, Sec. 420, Sec. 463, Sec. 383, Sec.500
  • 12.  Online Defamation SMC Pneumatics (India) Pvt ltd v Jogesh Kwata Shreya Singhal v. UOI  Data mining or corporate espionage Abhinav Gupta v. State of Haryana  Phishing Shri Umashankar Sivasubramanian v. ICICI Bank  Cyber stalking Unknown v. Jawaharlal Nehru University  Computer Forgery Abdul Kareem Telgi scam Parliament Attack case  Hate Speech Sandeep Varghese v. State of Kerala  Piracy of music, films and other copyrighted materials Supercasette Industries v. My space inc
  • 13.  1) Education  2) Use a firewall  3) Click with caution  4) Practice safe surfing  5) Practice safe shopping  6) Use comprehensive security software and keep your system updated  7) Secure your wireless network  8) Use strong passwords  9) Use common sense  10) Be suspicious
  • 14.  11) Block spyware attacks  12) Be Social-Media Savvy  13) Secure your Mobile Devices  14) Protect your Data  15) Protect your e-identity  16) Avoid being scammed  17) Call the right person for help  18) National Cyber Crime Reporting Portal: https://cybercrime.gov.in/
  • 15. The Information Technology Act 2000 incorporates within its understanding the various cyber offences that the world is under the threat of in the contemporary era. Proper and timely implementation of the Act may help to curb the cyber menace and also make the cyber space a more secure, safe and easy space for storage, transactions and definitely sharing. Its proper interpretation and implementation is what is the need of the hour.
  • 16. “Be Safe, Brows Safe, Be Cyber Smart, Be Cyber Safe.”