SlideShare a Scribd company logo
1 of 19
MADE BY-
VINAY PANCHOLI
15ESKCS184
SUBMITTED TO-
Mr. SUNIL DHANKHAR
(Associate Professor)
INTRODUCTION
HISTORY OF CYBER CRIME
CATEGORIES OF CYBER CRIME
TYEPS OF CYBER CRIME
PREVENTION
CYBER LAW OF INDIA
IT ACT 2000
SECTIONS OF IT ACT
CONCLUSION
CONTENT
INTRODUCTION
Cyber crime is an activity
done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.
Cybercrime is defined as a crime in which a
computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to
commit an offense (child pornography, hate
crimes).
INTRODUCTION
Cyber crime is an activity
done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.
• The first recorded cyber crime took place in 1820.
• That is not surprising considering the fact that the
abacus, which is thought to be the earliest from of
a computer, has been around since 3500 B.c.
• In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
• The first spam email took place in 1976 when it
was sent out over the ARPANT.
• The first virus was installed on an Apple computer
in 1982 when a high school student, Rich skrenta,
developed the EIK Cloner.
INTRODUCTION
Cyber crime is an activity
done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.
We can categorize cyber crime in two ways.
• The computer as a target :- using a computer
to attacks other computer, e.g. Hacking,
virus/worms attacks, Dos attack etc.
• The computer as a weapon :- using a
computer to commit real world crime e.g.
cyber terrorism, credit card fraud and
child pornography etc.
Hacking
Child Pornography
Denial of service attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Piracy
HACKING :- Hacking in simple terms means an illegal
intrusion info a computer system and/or network . It is also
known as CRACKING. Government websites are the hot
target of the hackers due to the press coverage, it receives.
Hackers enjoy the media coverage.
Motive behind the crime called HACKERS.
Motive behind the crime called hacking greed power,
publicity, revenge, adventure desire to access forbidden
information destructive mindset wants to sell n/w security
services.
DENIAL OF SERVICE ATTACKS : This is an act by the
criminals who floods the bandwidth of the victims network
or fills his E-mail box with spam mail depriving him of the
service he is entitled to access or provide. Many DOS
attacks, such as the ping of death and Tear drop attacks.
VIRUS DISSMINITION : Malicious software that attaches
itself to other software. VIRUS , WORMS, TROJAN HORSE
,WEB JACKING, E-MAIL BOMBING etc.
COMPUTER VANDALISM : Damaging or destroying data
rather than stealing or misusing them is called cyber
vandalism. These are program that attach themselves to a
file and then circulate.
CYBER TERRORISM : Terrorist attacks on the Internet is
by distributed denial of service attacks, hate websites
and hate E-mails , attacks on service network etc.
SOFTWARE PIRACY : Theft of software through the
illegal copying of genuine programs or the counterfeiting
and distribution of products intended to pass for the
original.
1. Use a full-service internet security suite
2. Use strong passwords
3. Keep your software updated
4. Manage your social media settings
5. Strengthen your home network
6. Know what to do if you become a victim
7. Different site, different passwords
8. If in doubt, block
9. Don't bank on public wi-fi
10. Only shop online on secure sites
11. More than one email account
12. Two-step verification
Cyber crime can involve criminal activities that are
traditional in nature, such as theft, fraud, deformation
and mischief, all of which are subjected to the India
Penal code. In simple way we can say that cyber crime is
unlawful acts where in the computer is either a tool or
both.
The abuse of computer has also given birth of new age
crime that are addressed by the
Information Technology Act,2000
The Information Technology Act, 2000 (also known as ITA-
2000, or the IT Act) is an Act of the Indian Parliament (No 21
of 2000) notified on 17 October 2000. It is the primary law
in India dealing with cybercrime and electronic commerce. It
is based on the United Nations Model Law on Electronic
Commerce 1996 (UNCITRAL Model) recommended by the
General Assembly of United Nations by a resolution dated 30
January 1997.
The original Act contained 94 sections, divided in 13 chapters
and 4 schedules. The laws apply to the whole of India.
Persons of other nationalities can also be indicted under the
law, if the crime involves a computer or network located in
India
Cybercrime is indeed getting the
recognition it deserves. However, it
is not going to restricted that
easily . In fact , it is highly likely
that cyber crime and its hackers
will continue developing and
upgrading to stay ahead of the law.
So, to make us a safer we must
need cyber security.
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay

More Related Content

What's hot (20)

Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 

Similar to Cyber Crime and Cyber Law of India BY Vinay

Similar to Cyber Crime and Cyber Law of India BY Vinay (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Presentation1
Presentation1Presentation1
Presentation1
 
English in written
English in writtenEnglish in written
English in written
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Cyber Crime and Cyber Law of India BY Vinay

  • 1.
  • 2. MADE BY- VINAY PANCHOLI 15ESKCS184 SUBMITTED TO- Mr. SUNIL DHANKHAR (Associate Professor)
  • 3. INTRODUCTION HISTORY OF CYBER CRIME CATEGORIES OF CYBER CRIME TYEPS OF CYBER CRIME PREVENTION CYBER LAW OF INDIA IT ACT 2000 SECTIONS OF IT ACT CONCLUSION CONTENT
  • 4. INTRODUCTION Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both. Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes).
  • 5. INTRODUCTION Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both. • The first recorded cyber crime took place in 1820. • That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c. • In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. • The first spam email took place in 1976 when it was sent out over the ARPANT. • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 6. INTRODUCTION Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both. We can categorize cyber crime in two ways. • The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. • The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and child pornography etc.
  • 7. Hacking Child Pornography Denial of service attack Virus Dissemination Computer Vandalism Cyber Terrorism Software Piracy
  • 8. HACKING :- Hacking in simple terms means an illegal intrusion info a computer system and/or network . It is also known as CRACKING. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS. Motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services.
  • 9. DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks. VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc. COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.
  • 10. CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc. SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 11.
  • 12. 1. Use a full-service internet security suite 2. Use strong passwords 3. Keep your software updated 4. Manage your social media settings 5. Strengthen your home network 6. Know what to do if you become a victim 7. Different site, different passwords 8. If in doubt, block 9. Don't bank on public wi-fi 10. Only shop online on secure sites 11. More than one email account 12. Two-step verification
  • 13. Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act,2000
  • 14. The Information Technology Act, 2000 (also known as ITA- 2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997. The original Act contained 94 sections, divided in 13 chapters and 4 schedules. The laws apply to the whole of India. Persons of other nationalities can also be indicted under the law, if the crime involves a computer or network located in India
  • 15.
  • 16.
  • 17. Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.