3. CONTENT
INTRODUCTION
HISTORY OF CYBER CRIME
CATEGORIES OF CYBER CRIME
TPS OF CYBER CRIME
CYBERCRIMES THREATENS NATIONAL SECORITY
CYBER SECURITY
ADVANTAGES OF CYBER SECURITY
SAFETY TIPS TO CYBER CRIME
CYBER LAW OF INDIA
CONCLUSION
4. INTRODUCTIONS
Cyber crime is an activity
done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.
5. WHAT IS THE CYBER CRIME?
SIMPLE THEORY
Whenyou purchaseahome it comeswith adoor
andalock. Youalwaysensurethat the door/lock
exist andworking properly. Youmay evenpurchase
securitysystems.
Well, why would you not secureyour
investments?
Likewise,YourSystemisyour home and security
tools areyour door/lock and security tools.
6. Soif someone breachesinto
your home’s(System),
accessesall yourpersonal
accounts and tampers your
data, is the criminal who is
committing thecrime.
Andcommitted crimeis
knowna scyber- crime.
7. HISTORY OF CYBER CRIME
•The first recorded cyber crime took place in
1820.
• In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
•The first spam email took place in 1976 when it
was sent out over the ARPANT.
•The first virus was installed on an Apple
computer in 1982 when a high school student,
Rich skrenta, developed the EIK Cloner.
9. • A total number of 90, 119, 252and 219
Government websites tracked by the
Indian Computer Emergency Response
Team (CERT-In) werehacked/ defacedby
various hackergroups in the year 2010,
2011,2012and Jan–Oct 2013 respectively.
10. CATEGORIES OF CYBER CRIME
•We can categorize cyber crime in two ways.
•The computer as a target :- using a computer to
attacks other computer, e.g. Hacking, virus/worms
attacks, Dos attack etc.
•The computer as a weapon :- using a computer to
commit real world crime e.g. cyber terrorism,
credit card fraud and pornography etc.
11. TYPES OF CYBER CRIME
•Hacking
•Denial of service attack
•Virus Dissemination
•Computer Vandalism
•Cyber Terrorism
•Software Piracy
12. 1.HACKING Hacking in simple terms
means an illegal intrusion into a
computer system and/or
networkHacking
2. DENIAL OF
SERVICE ATTACK
• Act by the criminal, who
floods the bandwidth of
the victims network.
• • Is his e-mail box with
spam mail depriving him
of the services.
13. 3. VIRUS DISSEMINATONI Malicious
software that attaches itself to other
software. (virus, worms, Trojan Horse, web
jacking, e-mail bombing etc.)
4. COMPUTER VANDALISM
• Damaging or destroying data rather than
stealing.
• Transmitting virus
14. 5. CYBER TERRORISM
• Use of Internet
based attacks in
terrorist
activities.
• Technology savvy
terrorists are
using 512-bit
encryption, which
is impossible to
decrypt
6. SOFTWARE PIRACY
• Theft of software
through the illegal
copying of genuine
programs.
• Distribution of
products intended
to pass for the
original.
15. CYBER CRIMES THREATENS
NATIONAL SECURITY
CYBER CRIMES THREATENS NATIONAL SECURITY
IN INDIA Likewise Union home minister Shivraj Patil
said that the rising level of cyber crime is an
indication of enormous threat to national security.
On Google’s social networking site orkut, facebook,
have been perplexing authorities . Fan clubs of
Underworld Dons like Dawood Ibrahim and Chhota
Shakeel and other wanted underworld dons are also
doing the rounds on orkut. There is huge potential
for damage to national security through cyber
attacks. The internet is a means for money bounding
and funding terrorist attacks in an organized manner.
16. CYBER SECURITY
• Internet security is a branch of
computer security specifically
related to the Internet.
• It's objective is to establish
rules and measure to use
against attacks over the
Internet.
17. ADVANTAGES OF CYBER SECURITY
The cyber security will defend us from
critical attacks.
It helps us to browse the site,
website.
Internet Security process all the
incoming and outgoing data on your
computer.
It will defend us from hacks and virus.
Application of cyber security used in
our PC needs update every week
18. SAFETY TIPS TO CYBER CRIME
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a
genderless screen name.
• Never give your full name or address
to strangers.
• Learn more about Internet privacy.
19. CYBER LAW OF INDIA
Cyber crime can involve criminal activities
that are traditional in nature, such as theft,
fraud, deformation and mischief, all of which
are subjected to the India Penal code. In
simple way we can say that cyber crime is
unlawful acts where in the computer is either
a tool or both. The abuse of computer has
also given birth of new age crime that are
addressed by the Information Technology
Act, 2000.
20. IT ACT 2000
The Information Technology act , 2000 received the assent
of president of India on 9 June 2000 and came into force
from 17 October in that same year .The act was enacted to
provide legal recognition for transaction carried out by
means of electronic data interchange and other means of
electronic communication , commonly referred to as
“Electronic Commerce” , to facilitate electronic filling of
documents with governments agencies which involve the
use of alternative to paper based method of
communication and storage information This law applies to
any kind of information in the form of data message used
in the context of commercial activities
21. IT Act-2000 : Objectives
To provide legal recognition for
transactions
To facilitate electronic filing of documents
with the Government agencies.
To amend the Indian Penal Code, The
Indian Evidence Act, 1872, The Banker's Book
Evidence Act, 1891 and the Reserve Bank of
India Act, 1934.
Aims to provide the legal framework to all
electronic records.
22. RESENT CYBER ATTACK IN INDIA
Cyber Attack on Cosmos Bank
A daring cyber attacks was carried in August 2018 on Cosmos
Bank’s Pune branch which saw nearly 94 Crores rupees being
siphoned off.
Hackers wiped out money and transferred it to a Hong Kong
situated bank by hacking the server of Cosmos Bank. A case was
filed by Cosmos bank with Pune cyber cell for the cyber attack.
Hackers hacked into the ATM server of the bank and stole details
of many visa and rupee debit cards owners.
The attack was not on centralized banking solution of Cosmos
bank. The balances and total accounts statistics remained
unchanged and there was no effect on the bank account of
holders. The switching system which acts as an interacting
module between the payment gateways and the bank’s
centralized banking solution was attacked