SlideShare a Scribd company logo
1 of 23
DR. S & S S
GHANDHY
ENGINEERING
COLLEGE,SURAT
INTRODUCTIONS TO CYBER
CRIME & CYBER LAW
Presented By
YAGNESH GARUD
(160230111015)
CONTENT
 INTRODUCTION
 HISTORY OF CYBER CRIME
 CATEGORIES OF CYBER CRIME
 TPS OF CYBER CRIME
 CYBERCRIMES THREATENS NATIONAL SECORITY
 CYBER SECURITY
 ADVANTAGES OF CYBER SECURITY
 SAFETY TIPS TO CYBER CRIME
 CYBER LAW OF INDIA
 CONCLUSION
INTRODUCTIONS
Cyber crime is an activity
done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.
WHAT IS THE CYBER CRIME?
SIMPLE THEORY
 Whenyou purchaseahome it comeswith adoor
andalock. Youalwaysensurethat the door/lock
exist andworking properly. Youmay evenpurchase
securitysystems.
 Well, why would you not secureyour
investments?
 Likewise,YourSystemisyour home and security
tools areyour door/lock and security tools.
 Soif someone breachesinto
your home’s(System),
accessesall yourpersonal
accounts and tampers your
data, is the criminal who is
committing thecrime.
 Andcommitted crimeis
knowna scyber- crime.
HISTORY OF CYBER CRIME
•The first recorded cyber crime took place in
1820.
• In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
•The first spam email took place in 1976 when it
was sent out over the ARPANT.
•The first virus was installed on an Apple
computer in 1982 when a high school student,
Rich skrenta, developed the EIK Cloner.
• 14,348websitedefacementsin2010,
• 6,850.inand4,150.comdomainsweredefaced
during 2011,
• 15,000siteshackedin2011,
• Indiaisthenumber1countryintheworldfor
generatingspam
• A total number of 90, 119, 252and 219
Government websites tracked by the
Indian Computer Emergency Response
Team (CERT-In) werehacked/ defacedby
various hackergroups in the year 2010,
2011,2012and Jan–Oct 2013 respectively.
CATEGORIES OF CYBER CRIME
•We can categorize cyber crime in two ways.
•The computer as a target :- using a computer to
attacks other computer, e.g. Hacking, virus/worms
attacks, Dos attack etc.
•The computer as a weapon :- using a computer to
commit real world crime e.g. cyber terrorism,
credit card fraud and pornography etc.
TYPES OF CYBER CRIME
•Hacking
•Denial of service attack
•Virus Dissemination
•Computer Vandalism
•Cyber Terrorism
•Software Piracy
1.HACKING Hacking in simple terms
means an illegal intrusion into a
computer system and/or
networkHacking
2. DENIAL OF
SERVICE ATTACK
• Act by the criminal, who
floods the bandwidth of
the victims network.
• • Is his e-mail box with
spam mail depriving him
of the services.
3. VIRUS DISSEMINATONI Malicious
software that attaches itself to other
software. (virus, worms, Trojan Horse, web
jacking, e-mail bombing etc.)
4. COMPUTER VANDALISM
• Damaging or destroying data rather than
stealing.
• Transmitting virus
5. CYBER TERRORISM
• Use of Internet
based attacks in
terrorist
activities.
• Technology savvy
terrorists are
using 512-bit
encryption, which
is impossible to
decrypt
6. SOFTWARE PIRACY
• Theft of software
through the illegal
copying of genuine
programs.
• Distribution of
products intended
to pass for the
original.
CYBER CRIMES THREATENS
NATIONAL SECURITY
CYBER CRIMES THREATENS NATIONAL SECURITY
IN INDIA Likewise Union home minister Shivraj Patil
said that the rising level of cyber crime is an
indication of enormous threat to national security.
On Google’s social networking site orkut, facebook,
have been perplexing authorities . Fan clubs of
Underworld Dons like Dawood Ibrahim and Chhota
Shakeel and other wanted underworld dons are also
doing the rounds on orkut. There is huge potential
for damage to national security through cyber
attacks. The internet is a means for money bounding
and funding terrorist attacks in an organized manner.
CYBER SECURITY
• Internet security is a branch of
computer security specifically
related to the Internet.
• It's objective is to establish
rules and measure to use
against attacks over the
Internet.
ADVANTAGES OF CYBER SECURITY
The cyber security will defend us from
critical attacks.
It helps us to browse the site,
website.
Internet Security process all the
incoming and outgoing data on your
computer.
It will defend us from hacks and virus.
Application of cyber security used in
our PC needs update every week
SAFETY TIPS TO CYBER CRIME
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a
genderless screen name.
• Never give your full name or address
to strangers.
• Learn more about Internet privacy.
CYBER LAW OF INDIA
Cyber crime can involve criminal activities
that are traditional in nature, such as theft,
fraud, deformation and mischief, all of which
are subjected to the India Penal code. In
simple way we can say that cyber crime is
unlawful acts where in the computer is either
a tool or both. The abuse of computer has
also given birth of new age crime that are
addressed by the Information Technology
Act, 2000.
IT ACT 2000
The Information Technology act , 2000 received the assent
of president of India on 9 June 2000 and came into force
from 17 October in that same year .The act was enacted to
provide legal recognition for transaction carried out by
means of electronic data interchange and other means of
electronic communication , commonly referred to as
“Electronic Commerce” , to facilitate electronic filling of
documents with governments agencies which involve the
use of alternative to paper based method of
communication and storage information This law applies to
any kind of information in the form of data message used
in the context of commercial activities
IT Act-2000 : Objectives
To provide legal recognition for
transactions
To facilitate electronic filing of documents
with the Government agencies.
To amend the Indian Penal Code, The
Indian Evidence Act, 1872, The Banker's Book
Evidence Act, 1891 and the Reserve Bank of
India Act, 1934.
Aims to provide the legal framework to all
electronic records.
RESENT CYBER ATTACK IN INDIA
Cyber Attack on Cosmos Bank
A daring cyber attacks was carried in August 2018 on Cosmos
Bank’s Pune branch which saw nearly 94 Crores rupees being
siphoned off.
Hackers wiped out money and transferred it to a Hong Kong
situated bank by hacking the server of Cosmos Bank. A case was
filed by Cosmos bank with Pune cyber cell for the cyber attack.
Hackers hacked into the ATM server of the bank and stole details
of many visa and rupee debit cards owners.
The attack was not on centralized banking solution of Cosmos
bank. The balances and total accounts statistics remained
unchanged and there was no effect on the bank account of
holders. The switching system which acts as an interacting
module between the payment gateways and the bank’s
centralized banking solution was attacked
THANK YOU

More Related Content

What's hot (20)

Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Tax evasion and avoidance
Tax evasion and avoidanceTax evasion and avoidance
Tax evasion and avoidance
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Input tax credit under GST
Input tax credit under GSTInput tax credit under GST
Input tax credit under GST
 
Customs duty levy and collection
Customs duty   levy and collectionCustoms duty   levy and collection
Customs duty levy and collection
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 

Similar to Introducion cyber crime and cyber law

Similar to Introducion cyber crime and cyber law (20)

Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Introducion cyber crime and cyber law

  • 1. DR. S & S S GHANDHY ENGINEERING COLLEGE,SURAT
  • 2. INTRODUCTIONS TO CYBER CRIME & CYBER LAW Presented By YAGNESH GARUD (160230111015)
  • 3. CONTENT  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TPS OF CYBER CRIME  CYBERCRIMES THREATENS NATIONAL SECORITY  CYBER SECURITY  ADVANTAGES OF CYBER SECURITY  SAFETY TIPS TO CYBER CRIME  CYBER LAW OF INDIA  CONCLUSION
  • 4. INTRODUCTIONS Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 5. WHAT IS THE CYBER CRIME? SIMPLE THEORY  Whenyou purchaseahome it comeswith adoor andalock. Youalwaysensurethat the door/lock exist andworking properly. Youmay evenpurchase securitysystems.  Well, why would you not secureyour investments?  Likewise,YourSystemisyour home and security tools areyour door/lock and security tools.
  • 6.  Soif someone breachesinto your home’s(System), accessesall yourpersonal accounts and tampers your data, is the criminal who is committing thecrime.  Andcommitted crimeis knowna scyber- crime.
  • 7. HISTORY OF CYBER CRIME •The first recorded cyber crime took place in 1820. • In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. •The first spam email took place in 1976 when it was sent out over the ARPANT. •The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 8. • 14,348websitedefacementsin2010, • 6,850.inand4,150.comdomainsweredefaced during 2011, • 15,000siteshackedin2011, • Indiaisthenumber1countryintheworldfor generatingspam
  • 9. • A total number of 90, 119, 252and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) werehacked/ defacedby various hackergroups in the year 2010, 2011,2012and Jan–Oct 2013 respectively.
  • 10. CATEGORIES OF CYBER CRIME •We can categorize cyber crime in two ways. •The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. •The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 11. TYPES OF CYBER CRIME •Hacking •Denial of service attack •Virus Dissemination •Computer Vandalism •Cyber Terrorism •Software Piracy
  • 12. 1.HACKING Hacking in simple terms means an illegal intrusion into a computer system and/or networkHacking 2. DENIAL OF SERVICE ATTACK • Act by the criminal, who floods the bandwidth of the victims network. • • Is his e-mail box with spam mail depriving him of the services.
  • 13. 3. VIRUS DISSEMINATONI Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.) 4. COMPUTER VANDALISM • Damaging or destroying data rather than stealing. • Transmitting virus
  • 14. 5. CYBER TERRORISM • Use of Internet based attacks in terrorist activities. • Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt 6. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs. • Distribution of products intended to pass for the original.
  • 15. CYBER CRIMES THREATENS NATIONAL SECURITY CYBER CRIMES THREATENS NATIONAL SECURITY IN INDIA Likewise Union home minister Shivraj Patil said that the rising level of cyber crime is an indication of enormous threat to national security. On Google’s social networking site orkut, facebook, have been perplexing authorities . Fan clubs of Underworld Dons like Dawood Ibrahim and Chhota Shakeel and other wanted underworld dons are also doing the rounds on orkut. There is huge potential for damage to national security through cyber attacks. The internet is a means for money bounding and funding terrorist attacks in an organized manner.
  • 16. CYBER SECURITY • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet.
  • 17. ADVANTAGES OF CYBER SECURITY The cyber security will defend us from critical attacks. It helps us to browse the site, website. Internet Security process all the incoming and outgoing data on your computer. It will defend us from hacks and virus. Application of cyber security used in our PC needs update every week
  • 18. SAFETY TIPS TO CYBER CRIME • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy.
  • 19. CYBER LAW OF INDIA Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.
  • 20. IT ACT 2000 The Information Technology act , 2000 received the assent of president of India on 9 June 2000 and came into force from 17 October in that same year .The act was enacted to provide legal recognition for transaction carried out by means of electronic data interchange and other means of electronic communication , commonly referred to as “Electronic Commerce” , to facilitate electronic filling of documents with governments agencies which involve the use of alternative to paper based method of communication and storage information This law applies to any kind of information in the form of data message used in the context of commercial activities
  • 21. IT Act-2000 : Objectives To provide legal recognition for transactions To facilitate electronic filing of documents with the Government agencies. To amend the Indian Penal Code, The Indian Evidence Act, 1872, The Banker's Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934. Aims to provide the legal framework to all electronic records.
  • 22. RESENT CYBER ATTACK IN INDIA Cyber Attack on Cosmos Bank A daring cyber attacks was carried in August 2018 on Cosmos Bank’s Pune branch which saw nearly 94 Crores rupees being siphoned off. Hackers wiped out money and transferred it to a Hong Kong situated bank by hacking the server of Cosmos Bank. A case was filed by Cosmos bank with Pune cyber cell for the cyber attack. Hackers hacked into the ATM server of the bank and stole details of many visa and rupee debit cards owners. The attack was not on centralized banking solution of Cosmos bank. The balances and total accounts statistics remained unchanged and there was no effect on the bank account of holders. The switching system which acts as an interacting module between the payment gateways and the bank’s centralized banking solution was attacked