SlideShare a Scribd company logo
1 of 25
CYBER
CRIME
SESSION 1
AGENDA
 What is Cyber Crime?
 CIA triad
 Cyber crimes using Mobile
 Cyber crime with computer and internet
 Hacking
 identity theft
 Cyber Stalking
 Cyber Defamation
 Pornography
 Other Important Cyber Crimes
 Phishing
 Email Spoofing
 Cyber Piracy
 Cyber Terrorism
 Cyber Terrorism
 Government Power to Intercept
 Online Cheating & Lottery Scam
 Cyber warfare
Sunday, August 6, 2017
Suresh Kumar K
WHAT IS CYBER
CRIME?
Cyber crime, or computer related crime, is crime that involves a
computer and a network. The computer may have been used in
the commission of a crime, or it may be the target.
Or
Offences that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm, or loss,
to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including
but not limited to Chat rooms, emails, notice boards and groups)
and mobile phones (Bluetooth/SMS/MMS)"
Sunday, August 6, 2017
Suresh Kumar K
Sunday, August 6, 2017
Suresh Kumar K
A report (sponsored by McAfee) estimates
that the annual damage to the global
economy is at $445 billion
In 2016, a study by Juniper Research
estimated that the costs of cybercrime
could be as high as 2.1 trillion by 2019.
China
USA
India
Netherlands
Taiwan
Symantec Corps
Sunday, August 6, 2017
Suresh Kumar K
Crime in India – 2015(http://ncrb.gov.in/)
CIA TRIAD
Security
Confidentiality
AvailabilityIntegrity
Sunday, August 6, 2017
Suresh Kumar K
CYBER CRIMES USING MOBILE
Cyber bullying
Sexting
Privacy violation
Malware
Mobile cyber stalking
Sunday, August 6, 2017
Suresh Kumar K
Your Information Is Your Asset
 Tangible
 Intangible assets
SAN BERNARDINO ATTACK
Sunday, August 6, 2017
Suresh Kumar K
CYBER CRIME WITH COMPUTER
AND INTERNET
Sunday, August 6, 2017
Suresh Kumar K
HACKING
Unauthorized access of Computer, Computer Resources,
Computer Network, Telecommunication Devices,
Telecommunication Media, etc. with an intention to take the
control over the information stored in it or transmitting through the
Cyber Space
Section 65 & 66 of IT Act
Sunday, August 6, 2017
Suresh Kumar K
IDENTITY THEFT
Whoever, fraudulently or dishonestly make use of the electronic
signature, password or any other unique identification feature of
any other person
Section 66C of IT Act
Sunday, August 6, 2017
Suresh Kumar K
CYBER STALKING
Cyber Stalking is generally considered as use of the Internet, e-
mail or other electronic communications device to stalk or harass
a person. A person following another especially women and
continuously harassing through online
Section 66 of IT Act
Sunday, August 6, 2017
Suresh Kumar K
CYBER DEFAMATION
Publishing statements lowering the reputation of persons. When
someone publishes defamatory matter about someone on a
website or sends e-mails, pictures, etc. containing defamatory
information to all of that person's friends or on the internet.
66A of IT Act
Sunday, August 6, 2017
Suresh Kumar K
PORNOGRAPHY
Section 67A of IT Act
Sunday, August 6, 2017
Suresh Kumar K
OTHER IMPORTANT CYBER
CRIMES
Sunday, August 6, 2017
Suresh Kumar K
PHISHING
phishing is a fraudulent attempt, usually made through emails, SMS,
phone calls, etc. to seeking your personal information. Criminal sends
false links and creates a “mirror” website that looks like a legitimate
website for trapping this crime. The fake website will fool people and
taking into the criminal’s site and collect your valuable information like
your user name and password.
Sec 420, 464 IPC & Sec 66 D of IT Act
Sunday, August 6, 2017
Suresh Kumar K
EMAIL SPOOFING
E-mail spoofing is the forgery of an e-mail header so that the
message appears to have originated from someone or somewhere
other than the actual source. A spoofed email is one that appears to
originate from one source but actually has been sent from another
source.
Section 66 D of IT Act
Sunday, August 6, 2017
Suresh Kumar K
https://emkei.cz/
CYBER PIRACY
Cyber Piracy is defined as art of making illegal copies of Music,
Movies, Videos, Books, software etc. for the purpose of sale
Sunday, August 6, 2017
Suresh Kumar K
CYBER TERRORISM
Whoever uses cyberspace with intent to threaten the unity,
integrity, security or sovereignty of India or to strike terror in the
people. Punishment - Imprisonment which may extent to life
imprisonment
Sec 66 F of IT Act
Sunday, August 6, 2017
Suresh Kumar K
GOVERNMENT POWER
TO INTERCEPT
Government to intercept, monitor or decrypt any information
generated through any computer resource if it thinks to do so in
the interest of the sovereignty or integrity of India.
Section 69 of IT Act
Sunday, August 6, 2017
Suresh Kumar K
Pakistan govt website
hacked, Indian national
anthem posted
ONLINE CHEATING &
LOTTERY SCAM
Sending group Emails, SMS, etc to people in the form of lottery
prize distribution, Job offers, Charity work, etc. People are
advised to not respond with these SMS or Email and inform the
police, if it is disturbing you. Don’t reply to this SMS or Emails and
don’t share any personal information and money with them.
Sunday, August 6, 2017
Suresh Kumar K
CYBER WARFARE
 Denial of service attack
 (http://map.norsecorp.com/#/)
 Stuxnet
 Zero Days Documentary 2016
Sunday, August 6, 2017
Suresh Kumar K
MALWARE
 Virus :
• Melisa virus
 Worm :
• I Love You Virus
 Botnet :
• 2007 Strom
Sunday, August 6, 2017
Suresh Kumar K
 Trojan :
• Spyware
 Ransomware:
• Wannacry
• Petya
social engineering
You are the shield
ANY QUESTION ?
Sunday, August 6, 2017
Suresh Kumar K
THANK YOU
Sunday, August 6, 2017
Suresh Kumar K

More Related Content

Similar to Cyber crime in india

Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
Information Technology Act - Offences edited.pdf
Information Technology Act - Offences edited.pdfInformation Technology Act - Offences edited.pdf
Information Technology Act - Offences edited.pdfSrideviAyaluri1
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHIApoorva Billore
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
15998595.ppt
15998595.ppt15998595.ppt
15998595.pptMrVMNair
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesJayakumar PP
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Adv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Adv Prashant Mali
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
 

Similar to Cyber crime in india (12)

Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Information Technology Act - Offences edited.pdf
Information Technology Act - Offences edited.pdfInformation Technology Act - Offences edited.pdf
Information Technology Act - Offences edited.pdf
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
15998595.ppt
15998595.ppt15998595.ppt
15998595.ppt
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and Opportunities
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 

Recently uploaded

General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Cyber crime in india

  • 2. AGENDA  What is Cyber Crime?  CIA triad  Cyber crimes using Mobile  Cyber crime with computer and internet  Hacking  identity theft  Cyber Stalking  Cyber Defamation  Pornography  Other Important Cyber Crimes  Phishing  Email Spoofing  Cyber Piracy  Cyber Terrorism  Cyber Terrorism  Government Power to Intercept  Online Cheating & Lottery Scam  Cyber warfare Sunday, August 6, 2017 Suresh Kumar K
  • 3. WHAT IS CYBER CRIME? Cyber crime, or computer related crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Or Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including but not limited to Chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)" Sunday, August 6, 2017 Suresh Kumar K
  • 4. Sunday, August 6, 2017 Suresh Kumar K A report (sponsored by McAfee) estimates that the annual damage to the global economy is at $445 billion In 2016, a study by Juniper Research estimated that the costs of cybercrime could be as high as 2.1 trillion by 2019. China USA India Netherlands Taiwan Symantec Corps
  • 5. Sunday, August 6, 2017 Suresh Kumar K Crime in India – 2015(http://ncrb.gov.in/)
  • 7. CYBER CRIMES USING MOBILE Cyber bullying Sexting Privacy violation Malware Mobile cyber stalking Sunday, August 6, 2017 Suresh Kumar K Your Information Is Your Asset  Tangible  Intangible assets
  • 8. SAN BERNARDINO ATTACK Sunday, August 6, 2017 Suresh Kumar K
  • 9. CYBER CRIME WITH COMPUTER AND INTERNET Sunday, August 6, 2017 Suresh Kumar K
  • 10. HACKING Unauthorized access of Computer, Computer Resources, Computer Network, Telecommunication Devices, Telecommunication Media, etc. with an intention to take the control over the information stored in it or transmitting through the Cyber Space Section 65 & 66 of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 11. IDENTITY THEFT Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person Section 66C of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 12. CYBER STALKING Cyber Stalking is generally considered as use of the Internet, e- mail or other electronic communications device to stalk or harass a person. A person following another especially women and continuously harassing through online Section 66 of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 13. CYBER DEFAMATION Publishing statements lowering the reputation of persons. When someone publishes defamatory matter about someone on a website or sends e-mails, pictures, etc. containing defamatory information to all of that person's friends or on the internet. 66A of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 14. PORNOGRAPHY Section 67A of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 15. OTHER IMPORTANT CYBER CRIMES Sunday, August 6, 2017 Suresh Kumar K
  • 16. PHISHING phishing is a fraudulent attempt, usually made through emails, SMS, phone calls, etc. to seeking your personal information. Criminal sends false links and creates a “mirror” website that looks like a legitimate website for trapping this crime. The fake website will fool people and taking into the criminal’s site and collect your valuable information like your user name and password. Sec 420, 464 IPC & Sec 66 D of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 17. EMAIL SPOOFING E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. A spoofed email is one that appears to originate from one source but actually has been sent from another source. Section 66 D of IT Act Sunday, August 6, 2017 Suresh Kumar K https://emkei.cz/
  • 18. CYBER PIRACY Cyber Piracy is defined as art of making illegal copies of Music, Movies, Videos, Books, software etc. for the purpose of sale Sunday, August 6, 2017 Suresh Kumar K
  • 19. CYBER TERRORISM Whoever uses cyberspace with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people. Punishment - Imprisonment which may extent to life imprisonment Sec 66 F of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 20. GOVERNMENT POWER TO INTERCEPT Government to intercept, monitor or decrypt any information generated through any computer resource if it thinks to do so in the interest of the sovereignty or integrity of India. Section 69 of IT Act Sunday, August 6, 2017 Suresh Kumar K Pakistan govt website hacked, Indian national anthem posted
  • 21. ONLINE CHEATING & LOTTERY SCAM Sending group Emails, SMS, etc to people in the form of lottery prize distribution, Job offers, Charity work, etc. People are advised to not respond with these SMS or Email and inform the police, if it is disturbing you. Don’t reply to this SMS or Emails and don’t share any personal information and money with them. Sunday, August 6, 2017 Suresh Kumar K
  • 22. CYBER WARFARE  Denial of service attack  (http://map.norsecorp.com/#/)  Stuxnet  Zero Days Documentary 2016 Sunday, August 6, 2017 Suresh Kumar K
  • 23. MALWARE  Virus : • Melisa virus  Worm : • I Love You Virus  Botnet : • 2007 Strom Sunday, August 6, 2017 Suresh Kumar K  Trojan : • Spyware  Ransomware: • Wannacry • Petya social engineering You are the shield
  • 24. ANY QUESTION ? Sunday, August 6, 2017 Suresh Kumar K
  • 25. THANK YOU Sunday, August 6, 2017 Suresh Kumar K