SlideShare a Scribd company logo
1 of 40
Sardar Patel University of Police,
Security & Criminal Justice, Jodhpur
A presentation by: SHUBHAM SINGH
Under the guidance of Dr. MITHILESH NARAYAN BHATT
1
Aanalysis of
CYBERCRIME
Policing and its
KNOWLEDGE
among Students
1.
Introduction
Why? Cyber Security
3
“I fear the day that technology
will surpass our human
interaction. The world will have
a generation of idiots.”
4
Cyber Crime
× crime or illegal activity that is done using the
internet
× a criminal offense involving a computer as the
object of the crime, or
× the tool used to commit a material component of
the offense
Crime of another world i.e. cyberspace.
5
Cyber Crime
criminal activities carried
out by means of computers
or the Internet
No physical contact
do not require the use of
any force
How it’s different?
Conventional Crime
usually leave evidence that
can be used to spot them
take shorter time period to
investigate
6
Are you
secure?
You are secure until embattled or targeted.
7
What kind of
person you are?
Aware
People having
knowledge of
programming
Updated with gadgets
and technology
Maintain anonymity
Mainstream
Have privacy concern
Updated with social
media
know about security
Follow terms and
conditions
Noob
a person who is
inexperienced in a
particular sphere or
activity, especially
computing or the use of
the Internet
8
Data Breaches over the world in 2017
9
43%
4%
23%
30%
2.
Cyber
Policing
An intelligent policing
10
Cybercrime
Investigation
Mechanism in India
11
Gathering
Information
Questionnning
Computer
Forensics
Techniques of
cybercrime
investigation
Searching Who is
Analysis of webserver
logs
Trying to recover deleted
evidences
12
Tracking IP
Address
Tracking of email
account
Trying to crack the password
Trying to find out hidden data
13
Cases Register Under
IT Act
× Tampering of electronic documents – sec. 65 of IT
Act
× Loss or damage to computer utility or resource –
sec 66(1)
× Hacking – sec. 66(2)
× Electronic obscenity – sec. 67
× Failures of order of certifying authority – sec. 685
× Unauthorized access to computer system – sec. 70
× Misrepresentation – sec. 71
× Fake digital signature publishing – sec. 73
× Fake digital signature – sec. 74
× Privacy/confidentiality breach – sec. 72
And many other crimes.
14
$15,000,000,00
0
Cryptocurrency stolen from online cryptocurrency
exchanges between 2012 and 2017 (in USD)
15
$15,000,000,000
In 5 years
$2,993,094
In one year, Only in India
16
But we all
are here to
talk about
Peace
A small journey for the study of analysis
of the knowledge of cybercrimes
among the students.
17
3.
Knowledge is
Power
Knowledge of cybercrime among students
through report.
18
Map markers shows where responses for the study are taken.
19
How questionnaire
was performed?
Form Link Sent to
Responder
Responder
filled Data
Extract
Information
from
Google
Form
20
The total number of responders are 53 from those 50 considered as potential
respondents.
21
41%
5%
11% 9%
7%
27%
34%
Responder's Location
Jodhpur Amritsar Jharkhand
Delhi RSD Ferozepur JNV Ferozepur
Educational qualification of the responders
22
12th
36%
UG
48%
PG
16%
EDUCATION QUALIFICATIONS
How many of them know about IT Act?
23
88%
12%
KNOWLEDGE OF IT ACT
Yes No
How many of them believe IT Act is capable?
24
17
15
18
YES NO MAY BE
NOOFPEOPLEBELIVE
OUT OF 50 PEOPLE
IS IT ACT CAPABLE?
Is IT ACT capable?
Do an international law, rather than a law specific to a nation’s jurisdiction is more beneficial?
25
66%
20%
14%
There should be an International Law rather than local laws
on Cyber crimes
YES MAYBE NO
How many participants encountered cybercrime?
26
56%
44%
ENCOUNTERED CYBERCRIME
YES
NO
Have you ever encounter cyber crime?
27
What will you do?
28
Inform Superior
personnel within
theorganization
34%
Inform the Police
26%
React to it on
your own
initiative
30%
Ignore it
10%
IF YOU COME ACROSS A CYBER CRIME IN
YOUR LINE OF WORK HOW WOULD YOU
RESPOND TO IT?
Do your institution have proper protocol to address cybercrime?
29
YES
54%
NO
46%
Oragnisation with protocol to address cybercrime
YES NO
Do only government should worry about cybercrime?
30
YES
34%
No, other agencies
should also be
authorised to take
initiative.
66%
Only government should worry about Cybercrime
YES No, other agencies should also be authorised to take initiative.
Most of the cybercrimes are committed by insiders(acquaintances) or
disgruntled ex-employees do you agree with this?
31
14%
38%32%
12%
4%
cyber crimes are committed by insiders
Strongly Agree Agree Neutral Disagree Strongly Disagree
Do women and children are more prone to cybercrime?
32
38, 76%
4, 8%
8, 16%
Women and children are more prone to cybercrime
YES NO MAYBE
33
74%
10%
16%
Proper education in the use of cyberspace to people
would prevent cybercrime
Yes NO Maybe
Do your cyber police stations are competent?
34
20%
40%
40%
Cybercrime Police Stations in India are competent
YES NO NOT SURE
Most common loss, you do feel due to cybercrime?
35
20%
44%
12%
6%
18%
Most common loss due cybercrime
Money Reputation Service quality Competitive edge Not sure
Conclusion
× Computers are playing a major role
× Without computer we are not going to do any work
× Increase use of technology will also lead to increase
in crime rate
× Cyber crime case has to be handled very carefully in
order to cull out the truth.
× Giving training for the police and judicial officers is
very important.
× India has to develop a lot in handling cyber crimes
cases. 36
Suggestions
× Internet security to be tightened
× Encryption technology to be used
× Intrusion detection systems to be used
× Cyber Law has to be amended
× Cyber forensic lab should be get established in
all the police stations
× Educating the public on cyber crimes cases
× Motivating cyber crime victims for registering
complaint against the criminals.
37
Credits
Special thanks to all the people who made and
released these awesome resources for free:
× Library Media
× Computer Lab
× Presentation template by SlidesCarnival
× Photographs by Unsplash, Google Images
× Data by Trustwave, Economic Times & Report
38
Thanks!
Any questions?
You can find me at:
@TheShubhamSingh
th3shubhamsingh@m.me
39
Knowledge of Cyber Crime

More Related Content

Similar to Knowledge of Cyber Crime

Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2opiedog1
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Blair Gately
 
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagementTRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagementAnsgar Koene
 
Digital-Civility-2021-Global-Report.pptx
Digital-Civility-2021-Global-Report.pptxDigital-Civility-2021-Global-Report.pptx
Digital-Civility-2021-Global-Report.pptxNaghmaSaniyyah1
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Forensic Science Informatics P3 M3 D3
Forensic Science Informatics P3 M3 D3Forensic Science Informatics P3 M3 D3
Forensic Science Informatics P3 M3 D3Steve Bishop
 
Final report-on-survey-of-internet-standardization-in-nepal-2014
Final report-on-survey-of-internet-standardization-in-nepal-2014Final report-on-survey-of-internet-standardization-in-nepal-2014
Final report-on-survey-of-internet-standardization-in-nepal-2014Shreedeep Rayamajhi
 
Sherelle stubbs digital elements
Sherelle stubbs digital elementsSherelle stubbs digital elements
Sherelle stubbs digital elementssherelle74
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 
Common sense technology policy2
Common sense technology policy2Common sense technology policy2
Common sense technology policy2John Robinson
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Ipsos UK
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullyingJisc RSC East Midlands
 

Similar to Knowledge of Cyber Crime (20)

Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagementTRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
 
Digital-Civility-2021-Global-Report.pptx
Digital-Civility-2021-Global-Report.pptxDigital-Civility-2021-Global-Report.pptx
Digital-Civility-2021-Global-Report.pptx
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Forensic Science Informatics P3 M3 D3
Forensic Science Informatics P3 M3 D3Forensic Science Informatics P3 M3 D3
Forensic Science Informatics P3 M3 D3
 
Final report-on-survey-of-internet-standardization-in-nepal-2014
Final report-on-survey-of-internet-standardization-in-nepal-2014Final report-on-survey-of-internet-standardization-in-nepal-2014
Final report-on-survey-of-internet-standardization-in-nepal-2014
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
JUDE.docx
JUDE.docxJUDE.docx
JUDE.docx
 
Sherelle stubbs digital elements
Sherelle stubbs digital elementsSherelle stubbs digital elements
Sherelle stubbs digital elements
 
ETECH-3.0.pptx
ETECH-3.0.pptxETECH-3.0.pptx
ETECH-3.0.pptx
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Common sense technology policy2
Common sense technology policy2Common sense technology policy2
Common sense technology policy2
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullying
 

More from SHUBHAM SINGH

Fear of Crime among Senior Citizen with special reference to Jodhpur
Fear of Crime among Senior Citizen with special reference to JodhpurFear of Crime among Senior Citizen with special reference to Jodhpur
Fear of Crime among Senior Citizen with special reference to JodhpurSHUBHAM SINGH
 
Domestic Violence: A Cross-sectional Study
Domestic Violence: A Cross-sectional StudyDomestic Violence: A Cross-sectional Study
Domestic Violence: A Cross-sectional StudySHUBHAM SINGH
 
Recent Trends in Juvenile Delinquency
Recent Trends in Juvenile Delinquency Recent Trends in Juvenile Delinquency
Recent Trends in Juvenile Delinquency SHUBHAM SINGH
 
Intellectual Property Rights with Special Reference to Health
Intellectual Property Rights with Special Reference to HealthIntellectual Property Rights with Special Reference to Health
Intellectual Property Rights with Special Reference to HealthSHUBHAM SINGH
 
Chief Executive Officer
Chief Executive Officer Chief Executive Officer
Chief Executive Officer SHUBHAM SINGH
 
Biodiversity laws in india
Biodiversity laws in indiaBiodiversity laws in india
Biodiversity laws in indiaSHUBHAM SINGH
 
Akshay Ramanlal Desai
Akshay Ramanlal DesaiAkshay Ramanlal Desai
Akshay Ramanlal DesaiSHUBHAM SINGH
 

More from SHUBHAM SINGH (8)

Fear of Crime among Senior Citizen with special reference to Jodhpur
Fear of Crime among Senior Citizen with special reference to JodhpurFear of Crime among Senior Citizen with special reference to Jodhpur
Fear of Crime among Senior Citizen with special reference to Jodhpur
 
Domestic Violence: A Cross-sectional Study
Domestic Violence: A Cross-sectional StudyDomestic Violence: A Cross-sectional Study
Domestic Violence: A Cross-sectional Study
 
Recent Trends in Juvenile Delinquency
Recent Trends in Juvenile Delinquency Recent Trends in Juvenile Delinquency
Recent Trends in Juvenile Delinquency
 
Intellectual Property Rights with Special Reference to Health
Intellectual Property Rights with Special Reference to HealthIntellectual Property Rights with Special Reference to Health
Intellectual Property Rights with Special Reference to Health
 
Chief Executive Officer
Chief Executive Officer Chief Executive Officer
Chief Executive Officer
 
Biodiversity laws in india
Biodiversity laws in indiaBiodiversity laws in india
Biodiversity laws in india
 
Akshay Ramanlal Desai
Akshay Ramanlal DesaiAkshay Ramanlal Desai
Akshay Ramanlal Desai
 
Rajasthan Tourism
Rajasthan TourismRajasthan Tourism
Rajasthan Tourism
 

Recently uploaded

Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaFinlaw Consultancy Pvt Ltd
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notesPRATIKNAYAK31
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 

Recently uploaded (20)

Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notes
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in Midlothian
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 

Knowledge of Cyber Crime

  • 1. Sardar Patel University of Police, Security & Criminal Justice, Jodhpur A presentation by: SHUBHAM SINGH Under the guidance of Dr. MITHILESH NARAYAN BHATT 1
  • 2. Aanalysis of CYBERCRIME Policing and its KNOWLEDGE among Students
  • 4. “I fear the day that technology will surpass our human interaction. The world will have a generation of idiots.” 4
  • 5. Cyber Crime × crime or illegal activity that is done using the internet × a criminal offense involving a computer as the object of the crime, or × the tool used to commit a material component of the offense Crime of another world i.e. cyberspace. 5
  • 6. Cyber Crime criminal activities carried out by means of computers or the Internet No physical contact do not require the use of any force How it’s different? Conventional Crime usually leave evidence that can be used to spot them take shorter time period to investigate 6
  • 7. Are you secure? You are secure until embattled or targeted. 7
  • 8. What kind of person you are? Aware People having knowledge of programming Updated with gadgets and technology Maintain anonymity Mainstream Have privacy concern Updated with social media know about security Follow terms and conditions Noob a person who is inexperienced in a particular sphere or activity, especially computing or the use of the Internet 8
  • 9. Data Breaches over the world in 2017 9 43% 4% 23% 30%
  • 12. Techniques of cybercrime investigation Searching Who is Analysis of webserver logs Trying to recover deleted evidences 12 Tracking IP Address Tracking of email account Trying to crack the password Trying to find out hidden data
  • 14. × Tampering of electronic documents – sec. 65 of IT Act × Loss or damage to computer utility or resource – sec 66(1) × Hacking – sec. 66(2) × Electronic obscenity – sec. 67 × Failures of order of certifying authority – sec. 685 × Unauthorized access to computer system – sec. 70 × Misrepresentation – sec. 71 × Fake digital signature publishing – sec. 73 × Fake digital signature – sec. 74 × Privacy/confidentiality breach – sec. 72 And many other crimes. 14
  • 15. $15,000,000,00 0 Cryptocurrency stolen from online cryptocurrency exchanges between 2012 and 2017 (in USD) 15
  • 16. $15,000,000,000 In 5 years $2,993,094 In one year, Only in India 16
  • 17. But we all are here to talk about Peace A small journey for the study of analysis of the knowledge of cybercrimes among the students. 17
  • 18. 3. Knowledge is Power Knowledge of cybercrime among students through report. 18
  • 19. Map markers shows where responses for the study are taken. 19
  • 20. How questionnaire was performed? Form Link Sent to Responder Responder filled Data Extract Information from Google Form 20
  • 21. The total number of responders are 53 from those 50 considered as potential respondents. 21 41% 5% 11% 9% 7% 27% 34% Responder's Location Jodhpur Amritsar Jharkhand Delhi RSD Ferozepur JNV Ferozepur
  • 22. Educational qualification of the responders 22 12th 36% UG 48% PG 16% EDUCATION QUALIFICATIONS
  • 23. How many of them know about IT Act? 23 88% 12% KNOWLEDGE OF IT ACT Yes No
  • 24. How many of them believe IT Act is capable? 24 17 15 18 YES NO MAY BE NOOFPEOPLEBELIVE OUT OF 50 PEOPLE IS IT ACT CAPABLE? Is IT ACT capable?
  • 25. Do an international law, rather than a law specific to a nation’s jurisdiction is more beneficial? 25 66% 20% 14% There should be an International Law rather than local laws on Cyber crimes YES MAYBE NO
  • 26. How many participants encountered cybercrime? 26 56% 44% ENCOUNTERED CYBERCRIME YES NO
  • 27. Have you ever encounter cyber crime? 27
  • 28. What will you do? 28 Inform Superior personnel within theorganization 34% Inform the Police 26% React to it on your own initiative 30% Ignore it 10% IF YOU COME ACROSS A CYBER CRIME IN YOUR LINE OF WORK HOW WOULD YOU RESPOND TO IT?
  • 29. Do your institution have proper protocol to address cybercrime? 29 YES 54% NO 46% Oragnisation with protocol to address cybercrime YES NO
  • 30. Do only government should worry about cybercrime? 30 YES 34% No, other agencies should also be authorised to take initiative. 66% Only government should worry about Cybercrime YES No, other agencies should also be authorised to take initiative.
  • 31. Most of the cybercrimes are committed by insiders(acquaintances) or disgruntled ex-employees do you agree with this? 31 14% 38%32% 12% 4% cyber crimes are committed by insiders Strongly Agree Agree Neutral Disagree Strongly Disagree
  • 32. Do women and children are more prone to cybercrime? 32 38, 76% 4, 8% 8, 16% Women and children are more prone to cybercrime YES NO MAYBE
  • 33. 33 74% 10% 16% Proper education in the use of cyberspace to people would prevent cybercrime Yes NO Maybe
  • 34. Do your cyber police stations are competent? 34 20% 40% 40% Cybercrime Police Stations in India are competent YES NO NOT SURE
  • 35. Most common loss, you do feel due to cybercrime? 35 20% 44% 12% 6% 18% Most common loss due cybercrime Money Reputation Service quality Competitive edge Not sure
  • 36. Conclusion × Computers are playing a major role × Without computer we are not going to do any work × Increase use of technology will also lead to increase in crime rate × Cyber crime case has to be handled very carefully in order to cull out the truth. × Giving training for the police and judicial officers is very important. × India has to develop a lot in handling cyber crimes cases. 36
  • 37. Suggestions × Internet security to be tightened × Encryption technology to be used × Intrusion detection systems to be used × Cyber Law has to be amended × Cyber forensic lab should be get established in all the police stations × Educating the public on cyber crimes cases × Motivating cyber crime victims for registering complaint against the criminals. 37
  • 38. Credits Special thanks to all the people who made and released these awesome resources for free: × Library Media × Computer Lab × Presentation template by SlidesCarnival × Photographs by Unsplash, Google Images × Data by Trustwave, Economic Times & Report 38
  • 39. Thanks! Any questions? You can find me at: @TheShubhamSingh th3shubhamsingh@m.me 39

Editor's Notes

  1.  do not require the use of any force since the criminals merely use the identities of their victims to steal from them.
  2. According to economic times and trustwave Global security report
  3. In the upcoming years computers are playing a major role. In our day to day life without computer we are not going to do any work. So the increase use of technology will also lead to increase in crime rate. The cyber crime case has to be handled very carefully in order to cull out the truth. Giving training for the police and judicial officers is very important. India has to develop a lot in handling cyber crimes cases.