SlideShare a Scribd company logo
1 of 32
Information Security and Cyber Crimes:
The objective of this message is to educate
and create awareness amongst the public on
use of Technology, Internet media and its
implications on possible cyber crimes. Some
of the possible preventive measures, one can
take to avoid getting victimized for a cyber
crime
At the end of this presentation you
will learn
 What is Cyber Crime
 Types of Cyber Crime
 Threats & Trends of Cyber Crime
Criminals & Internet
 Cyber Laws Cyber crime is a generic term that refers to all
criminal activities done using the medium of computers, the
internet, cyber space and the worldwide web.
 "Cyber Security“ means protecting information, equipment,
devices, computer, computer resource, communication device
and information stored therein from unauthorized access, use,
disclosure, disruption, modification or destruction.
 Cyber law is a term used to describe the legal issues related
to use of communications technology, particularly
"cyberspace", i.e. the Internet. Cyber Law is represented by
Indian IT ACT 2008
Cyber Crime – Motivation
• Money/Greed
• Curiosity
• Revenge
• Fun
• Praise seekers
Cyber Crime – Upward Trends
• Huge increase in the use of Internet and smart phones
• Individuals share personal and work related
information on Internet
•Critical and sensitive information are shared on
Internet
• Financial transactions take place on Internet
• Security controls are never 100% and adequate
• BAD guys are always ahead of GOOD guys
Cyber Crime – Its No more a
fun
Committing any crime using
cyber space (using internet) is
no more fun as there are
stringent laws.
Common Cyber-crime scenarios and
Applicability of Legal Sections
 Let us look into some common cyber-crime scenarios
which can attract prosecution as per the penalties and
offences prescribed in IT Act 2000 (amended via 2008)
Act and Indian Penal Codes.
ATM Card Fraud and Lottery Fraud
• Committing cheating by impersonation in the name of
bank manager or e.g. using names and logos of reputed
companies
Provisions Applicable:- Sections 66C, 66D of IT Act and
section 420 of the IPC.
Harassment via fake public profile on social
networking site
• Creation of fake profile in social media using personal
details of others like picture, name and other data
Provisions Applicable:- Sections 66C of IT Act and 500 of
IPC
Online Hate Community
• Uploading mainly in social media and in other websites etc
with intent to spread communal hatred
Provisions Applicable: Section and 153/153A /
153B/295/295A/504/505 of the Indian Penal Code.
Email Account Hacking
• Making unauthorized access / hacking of mail ID , any
type of social network IDs, websites etc
Provisions Applicable:- Section 66 of Information
Technology Act
Creation of fake websites mainly for
cheating or defamation
• If any fake website or alike website is created for the
purpose of cheating or defamation to any organization
where identical features and logos are used.
• Provisions Applicable:- 66D of IT Act and
468/469/471/419/420 IPC
Introducing malignant contents, alteration
and deletion of data etc
• If any virus, worm, trojan,bug,backdoor,rootkit etc are
introduced in any computer system or if any alteration ,
deletion of data or unauthorized copying or erasing are
made.
Provisions Applicable:- Punishable under section 66 of IT
Act
Cyber Terrorism
• If with intent to threaten the unity , integrity , security or
sovereignty of country or to strike terror in the people or
for any act which may cause denial of services of computer
system
• Punishable u/s 66F of IT act
Online sale of illegal Articles
• Where sale of narcotics, drugs weapons and wildlife is
facilitated by the Internet
Provisions Applicable:- Generally conventional laws are
applied in these cases.
Phishing and Email Scams
• Phishing involves fraudulently acquiring sensitive
information through masquerading a site as a trusted
entity. (E.g. Passwords, credit card information)
Provisions Applicable:- section 66D of IT Act and Section
419/420 of IPC
Theft of Confidential Information (
Data Theft)
• Many business organizations store their confidential
information in computer systems. This informations are
targeted by rivals, criminals and disgruntled employees.
Provisions Applicable:- Sections 72/72A of IT Act and
406/408 of Indian Penal Code
Source Code Theft
• Source code generally is the most coveted and important
“crown jewel” asset of a company. If intentionally destroys
or alteration of source of code is committed which is
punishable under the following section of law.
• Provisions applicable:- Section 65 of IT Act and Section 63
of Copyright Act.
Uploading of videos/pictures having
sexual/pornographic contents
• Whoever publishes or transmits or causes to be published in the
electronic form, any material which is lascivious or appeals to
the prurient interest and for defamation of woman/girl.
• It is punishable u/s 67/67A/67B of IT Act and 354D/500/509 IPC
which may extent to more than 7 years.
• If morphing is made in the sexual material then sections
67/67A/67B of IT Act and 465/469/471/354D/500/509 IPC
Cyber Crime
• Curiosity and Revenge may be
primary reasons for a perpetrator
to get motivated for a cyber crime.
• Most of the times, people are not
aware about the implications of
cyber crimes/laws
• Girls are the most found victims of
a cyber crimes
• Monetary un-lawful or quick
Gain/profit
Common Scenarios – Defamatory Post
It is usually found that a victim shares photographs and personal videos in
good faith at the time of good relationship but the same photographs and
videos can be edited and uploaded in different social media sites and bad
websites in the pretext of revenge, defame, blackmail etc.
“Dos and don'ts"
Do not share your personal photographs and videos to
anyone,
Always secure your Profile picture in the social media, do
not accept friend requests from un-known persons.
Vishing calls (BANKING FRAUD)
IT IS ALSO COMMON THAT ONE RECEIVES FRAUD CALL FROM
UNKNOWN MOBILE NUMBERS REVEALING THEMSELVES AS BANK
MANAGERS OF REPUTED BANK AND IN THE NAME OF GIVING
SERVICE MANAGES TO COLLECT THE DEBIT CARD DETAILS AND
OTP’S, EVENTUALLY SYPHONING THE AMOUNT FROM THE
VICTIMS’ BANK ACCOUNT.
"Dos and Don'ts"
DO NOT ENTERTAIN ANY CALL WHO POSES AS CALLING FROM
BANK AUTHORITIES
DO NOT AT ANY CONDITION SHARE YOUR OTP’S TO ANY ONE
DO NOT SHARE YOUR “BANKING “SECURE PIN”
BANK NEVER ASK FOR ANY CARD NO OR OTP’S OR PIN NO. ETC
FACEBOOK RELATED FRAUD
Fraudsters these days use face book as the platform to cheat
innocent people, the fraudster creates an fancy face book
profile (foreigners) and sends friend requests which gets
accepted by common victims. Over a period of time and several
conversations once the fraudster has relevant information
about the victim (birthdays, anniversary, etc) he poses to have
sent gifts from abroad having high values, the victim then gets
call of confirmation from airport customs that a gift has come
which has high value and needs payment for clearance, the
victim pays the initial amount and there on keeps on receiving
call demanding money for more clearance and at the day gets
cheated.
"Dos and Don'ts"
DO NOT ACCEPT FRIEND REQUEST FROM UNKNOWN
PERSONS ON FACEBOOK OR ANY SOCIAL MEDIA.
DO NOT PAY FOR ANY GIFTS
Fake website related recruitment fraud:
 A fraudster creates alike website copying the entire
details from the Original Organisation and they
upload the false results containing the name of the
candidates (victims), charges money from innocent
youths pursuing a career. Who pay them in the
belief of getting Job? But later finds out at the time
of Joining that the entire process was a fraud.
Dos & Don’ts
Do not believe in touts as there are no ways
they can land you to a Job.
Look the URL of the website carefully. Contact
with the admin (contact details are available in
google) of the website before believing it.
Insurance Fraud:
 Fraudster mainly targets senior citizens and generally
contact them during the noon hours, in the name of
reopening the lapsed Insurance, they also visit their houses
and convinces the victim to issue cheques or and at times
provides an erasing pen to sign the cheque which they later
encash, thereby cheating the elderly people of huge fund.
They also issues new insurances in the name of the victim
as they get a majority of the commission for this.
"Dos and Don'ts"
Do not allow insurance agents to your house in
respect this sort of call.
Retired Servicemen Fraud:
Fraudster mainly posing as to be calling from the central
team calls retired persons and informs them that they have
sum of money which is due as arrear which will be credited
to the their account. But in order to avail the same the
victim needs to pay processing fees to different bank
accounts. At the end after paying the processing fees the
amount never gets credited to the victims account and
thereby gets cheated.
"Dos and Don'ts"
Do not entertain such type of calls, verify from
your former department about any increment or
arrears.
Departments never says to pay processing fees
into personal bank account
Other Common Cyber Crimes
Cyber crimes can be categorized and listed in multiple ways,
however some of the other common cyber crimes observed
are as below but not limited to :
• Cyber stalking
• Cyber Bullying
• Installing Key loggers
• Cyber Terrorism
• Email based Frauds
• Web jacking
• Online Gambling
• DoS Attacks
Security Awareness
Security Awareness
• Passwords are the only and/OR the primary option to
ensure privacy of your information
• Ensure Passwords are complex in nature
•Do not write passwords
•Do Not Keep your Display Pic (DP) in Whatsapp open
to everyone
• Do Not Accept friend request from unknown person.
• Keep your photos in Facebook secured
• Log- out from all devices after completing your work.
Security Awareness – Social Media
Social Media (FB, twitter, etc) is now an integral part of
our daily life
 Be sensitive in what you upload on your social
networking account (status, pics, etc)
 Use security and privacy options provided by social
media sites
 SMS based second factor authentication
 Access control (who can see what)
 Browser /machine mapping to your social media profile
 Block
 Keep your personal details, personal.
Security Awareness – Smart mobile devices
• Connect to ONLY authorized wifi access
• Use auto lock features
• Download apps from authorized app stores ONLY
• Use Privacy options provided by various mobile
Operating system
• Do NOT accept calls from weird numbers OR do not
give a call back
Thank You.

More Related Content

Similar to Cyber.ppt

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxSahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxSahilMishra81
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 

Similar to Cyber.ppt (20)

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Chapter5.ppt
Chapter5.pptChapter5.ppt
Chapter5.ppt
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 

Recently uploaded

Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 

Cyber.ppt

  • 1. Information Security and Cyber Crimes: The objective of this message is to educate and create awareness amongst the public on use of Technology, Internet media and its implications on possible cyber crimes. Some of the possible preventive measures, one can take to avoid getting victimized for a cyber crime
  • 2. At the end of this presentation you will learn  What is Cyber Crime  Types of Cyber Crime  Threats & Trends of Cyber Crime
  • 3. Criminals & Internet  Cyber Laws Cyber crime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide web.  "Cyber Security“ means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction.  Cyber law is a term used to describe the legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet. Cyber Law is represented by Indian IT ACT 2008
  • 4. Cyber Crime – Motivation • Money/Greed • Curiosity • Revenge • Fun • Praise seekers
  • 5. Cyber Crime – Upward Trends • Huge increase in the use of Internet and smart phones • Individuals share personal and work related information on Internet •Critical and sensitive information are shared on Internet • Financial transactions take place on Internet • Security controls are never 100% and adequate • BAD guys are always ahead of GOOD guys
  • 6. Cyber Crime – Its No more a fun Committing any crime using cyber space (using internet) is no more fun as there are stringent laws.
  • 7. Common Cyber-crime scenarios and Applicability of Legal Sections  Let us look into some common cyber-crime scenarios which can attract prosecution as per the penalties and offences prescribed in IT Act 2000 (amended via 2008) Act and Indian Penal Codes.
  • 8. ATM Card Fraud and Lottery Fraud • Committing cheating by impersonation in the name of bank manager or e.g. using names and logos of reputed companies Provisions Applicable:- Sections 66C, 66D of IT Act and section 420 of the IPC.
  • 9. Harassment via fake public profile on social networking site • Creation of fake profile in social media using personal details of others like picture, name and other data Provisions Applicable:- Sections 66C of IT Act and 500 of IPC
  • 10. Online Hate Community • Uploading mainly in social media and in other websites etc with intent to spread communal hatred Provisions Applicable: Section and 153/153A / 153B/295/295A/504/505 of the Indian Penal Code.
  • 11. Email Account Hacking • Making unauthorized access / hacking of mail ID , any type of social network IDs, websites etc Provisions Applicable:- Section 66 of Information Technology Act
  • 12. Creation of fake websites mainly for cheating or defamation • If any fake website or alike website is created for the purpose of cheating or defamation to any organization where identical features and logos are used. • Provisions Applicable:- 66D of IT Act and 468/469/471/419/420 IPC
  • 13. Introducing malignant contents, alteration and deletion of data etc • If any virus, worm, trojan,bug,backdoor,rootkit etc are introduced in any computer system or if any alteration , deletion of data or unauthorized copying or erasing are made. Provisions Applicable:- Punishable under section 66 of IT Act
  • 14. Cyber Terrorism • If with intent to threaten the unity , integrity , security or sovereignty of country or to strike terror in the people or for any act which may cause denial of services of computer system • Punishable u/s 66F of IT act
  • 15. Online sale of illegal Articles • Where sale of narcotics, drugs weapons and wildlife is facilitated by the Internet Provisions Applicable:- Generally conventional laws are applied in these cases.
  • 16. Phishing and Email Scams • Phishing involves fraudulently acquiring sensitive information through masquerading a site as a trusted entity. (E.g. Passwords, credit card information) Provisions Applicable:- section 66D of IT Act and Section 419/420 of IPC
  • 17. Theft of Confidential Information ( Data Theft) • Many business organizations store their confidential information in computer systems. This informations are targeted by rivals, criminals and disgruntled employees. Provisions Applicable:- Sections 72/72A of IT Act and 406/408 of Indian Penal Code
  • 18. Source Code Theft • Source code generally is the most coveted and important “crown jewel” asset of a company. If intentionally destroys or alteration of source of code is committed which is punishable under the following section of law. • Provisions applicable:- Section 65 of IT Act and Section 63 of Copyright Act.
  • 19. Uploading of videos/pictures having sexual/pornographic contents • Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest and for defamation of woman/girl. • It is punishable u/s 67/67A/67B of IT Act and 354D/500/509 IPC which may extent to more than 7 years. • If morphing is made in the sexual material then sections 67/67A/67B of IT Act and 465/469/471/354D/500/509 IPC
  • 20. Cyber Crime • Curiosity and Revenge may be primary reasons for a perpetrator to get motivated for a cyber crime. • Most of the times, people are not aware about the implications of cyber crimes/laws • Girls are the most found victims of a cyber crimes • Monetary un-lawful or quick Gain/profit
  • 21. Common Scenarios – Defamatory Post It is usually found that a victim shares photographs and personal videos in good faith at the time of good relationship but the same photographs and videos can be edited and uploaded in different social media sites and bad websites in the pretext of revenge, defame, blackmail etc. “Dos and don'ts" Do not share your personal photographs and videos to anyone, Always secure your Profile picture in the social media, do not accept friend requests from un-known persons.
  • 22. Vishing calls (BANKING FRAUD) IT IS ALSO COMMON THAT ONE RECEIVES FRAUD CALL FROM UNKNOWN MOBILE NUMBERS REVEALING THEMSELVES AS BANK MANAGERS OF REPUTED BANK AND IN THE NAME OF GIVING SERVICE MANAGES TO COLLECT THE DEBIT CARD DETAILS AND OTP’S, EVENTUALLY SYPHONING THE AMOUNT FROM THE VICTIMS’ BANK ACCOUNT. "Dos and Don'ts" DO NOT ENTERTAIN ANY CALL WHO POSES AS CALLING FROM BANK AUTHORITIES DO NOT AT ANY CONDITION SHARE YOUR OTP’S TO ANY ONE DO NOT SHARE YOUR “BANKING “SECURE PIN” BANK NEVER ASK FOR ANY CARD NO OR OTP’S OR PIN NO. ETC
  • 23. FACEBOOK RELATED FRAUD Fraudsters these days use face book as the platform to cheat innocent people, the fraudster creates an fancy face book profile (foreigners) and sends friend requests which gets accepted by common victims. Over a period of time and several conversations once the fraudster has relevant information about the victim (birthdays, anniversary, etc) he poses to have sent gifts from abroad having high values, the victim then gets call of confirmation from airport customs that a gift has come which has high value and needs payment for clearance, the victim pays the initial amount and there on keeps on receiving call demanding money for more clearance and at the day gets cheated. "Dos and Don'ts" DO NOT ACCEPT FRIEND REQUEST FROM UNKNOWN PERSONS ON FACEBOOK OR ANY SOCIAL MEDIA. DO NOT PAY FOR ANY GIFTS
  • 24. Fake website related recruitment fraud:  A fraudster creates alike website copying the entire details from the Original Organisation and they upload the false results containing the name of the candidates (victims), charges money from innocent youths pursuing a career. Who pay them in the belief of getting Job? But later finds out at the time of Joining that the entire process was a fraud. Dos & Don’ts Do not believe in touts as there are no ways they can land you to a Job. Look the URL of the website carefully. Contact with the admin (contact details are available in google) of the website before believing it.
  • 25. Insurance Fraud:  Fraudster mainly targets senior citizens and generally contact them during the noon hours, in the name of reopening the lapsed Insurance, they also visit their houses and convinces the victim to issue cheques or and at times provides an erasing pen to sign the cheque which they later encash, thereby cheating the elderly people of huge fund. They also issues new insurances in the name of the victim as they get a majority of the commission for this. "Dos and Don'ts" Do not allow insurance agents to your house in respect this sort of call.
  • 26. Retired Servicemen Fraud: Fraudster mainly posing as to be calling from the central team calls retired persons and informs them that they have sum of money which is due as arrear which will be credited to the their account. But in order to avail the same the victim needs to pay processing fees to different bank accounts. At the end after paying the processing fees the amount never gets credited to the victims account and thereby gets cheated. "Dos and Don'ts" Do not entertain such type of calls, verify from your former department about any increment or arrears. Departments never says to pay processing fees into personal bank account
  • 27. Other Common Cyber Crimes Cyber crimes can be categorized and listed in multiple ways, however some of the other common cyber crimes observed are as below but not limited to : • Cyber stalking • Cyber Bullying • Installing Key loggers • Cyber Terrorism • Email based Frauds • Web jacking • Online Gambling • DoS Attacks
  • 29. Security Awareness • Passwords are the only and/OR the primary option to ensure privacy of your information • Ensure Passwords are complex in nature •Do not write passwords •Do Not Keep your Display Pic (DP) in Whatsapp open to everyone • Do Not Accept friend request from unknown person. • Keep your photos in Facebook secured • Log- out from all devices after completing your work.
  • 30. Security Awareness – Social Media Social Media (FB, twitter, etc) is now an integral part of our daily life  Be sensitive in what you upload on your social networking account (status, pics, etc)  Use security and privacy options provided by social media sites  SMS based second factor authentication  Access control (who can see what)  Browser /machine mapping to your social media profile  Block  Keep your personal details, personal.
  • 31. Security Awareness – Smart mobile devices • Connect to ONLY authorized wifi access • Use auto lock features • Download apps from authorized app stores ONLY • Use Privacy options provided by various mobile Operating system • Do NOT accept calls from weird numbers OR do not give a call back