SlideShare a Scribd company logo

Cybercrime.ppt

1 of 20
Download to read offline
Cybercrime.ppt
CONTENT













INTRODUCTION
HISTORY OF CYBER CRIME
CATEGORIES OF CYBER CRIME
TYEPS OF CYBER CRIME
CYBERCRIMES THREATENS NATIONAL
SECORITY
CYBER SECURITY
ADVANTAGES OF CYBER SECURITY
SAFETY TIPS TO CYBER CRIME
CYBER LAW OF INDIA
CONCLUSION
INTRODUCTION
Cyber crime is an activity
done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.
HISTORY OF CYBER CRIME








The first recorded cyber crime took place in 1820.
That is not surprising considering the fact that the
abacus, which is thought to be the earliest from of a
computer, has been around since 3500 B.c.
In India, Japan and China, the era of modern
computer, however, began with the analytical engine
of Charles Babbage.
The first spam email took place in 1976 when it was
sent out over the ARPANT.
The first virus was installed on an Apple computer in
1982 when a high school student, Rich skrenta,
developed the EIK Cloner.
CATEGORIES OF CYBER CRIME
We can categorize cyber crime in two ways.
 The computer as a target :- using a computer
to attacks other computer, e.g. Hacking,
virus/worms attacks, Dos attack etc.
 The computer as a weapon :- using a
computer to commit real world crime e.g.
cyber terrorism, credit card fraud and
pornography etc.
TYPES OF CYBER CRIM

Recommended

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

More Related Content

What's hot

Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 

What's hot (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Computer security
Computer securityComputer security
Computer security
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
makalah-tentang-cyber-crime-dan-kejahatan-internet
makalah-tentang-cyber-crime-dan-kejahatan-internetmakalah-tentang-cyber-crime-dan-kejahatan-internet
makalah-tentang-cyber-crime-dan-kejahatan-internetKie Rahadian
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
SydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin FormsSydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin FormsAlec Tucker
 
Cyborg ppt presentation
Cyborg ppt presentationCyborg ppt presentation
Cyborg ppt presentationmunisai
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made EasyJerry Bishop
 
IT Governance Introduction
IT Governance  IntroductionIT Governance  Introduction
IT Governance IntroductionKeith Rackley
 
EFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationEFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationS L
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 

Viewers also liked (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
makalah-tentang-cyber-crime-dan-kejahatan-internet
makalah-tentang-cyber-crime-dan-kejahatan-internetmakalah-tentang-cyber-crime-dan-kejahatan-internet
makalah-tentang-cyber-crime-dan-kejahatan-internet
 
Power Point Cyber crime
Power Point Cyber crimePower Point Cyber crime
Power Point Cyber crime
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
SydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin FormsSydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin Forms
 
Cyborg ppt presentation
Cyborg ppt presentationCyborg ppt presentation
Cyborg ppt presentation
 
Cyborgs Powerpoint
Cyborgs PowerpointCyborgs Powerpoint
Cyborgs Powerpoint
 
Cyborg
CyborgCyborg
Cyborg
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
 
IT Governance Introduction
IT Governance  IntroductionIT Governance  Introduction
IT Governance Introduction
 
MIS 12 E-Governance
MIS 12 E-GovernanceMIS 12 E-Governance
MIS 12 E-Governance
 
Social responsibility
Social responsibilitySocial responsibility
Social responsibility
 
EFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationEFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentation
 
Hla typing and its role in tissue transplantation
Hla typing and its role in tissue transplantationHla typing and its role in tissue transplantation
Hla typing and its role in tissue transplantation
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber law
Cyber lawCyber law
Cyber law
 
What is IT Governance?
What is IT Governance?What is IT Governance?
What is IT Governance?
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Similar to Cybercrime.ppt

Similar to Cybercrime.ppt (20)

ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 

Recently uploaded

Cultural Value Orientation in Trans7 Youtube Channel Magazine Show Program an...
Cultural Value Orientation in Trans7 Youtube Channel Magazine Show Program an...Cultural Value Orientation in Trans7 Youtube Channel Magazine Show Program an...
Cultural Value Orientation in Trans7 Youtube Channel Magazine Show Program an...AJHSSR Journal
 
Personal Brand PresentationP&PIPBHSVI.pdf
Personal Brand PresentationP&PIPBHSVI.pdfPersonal Brand PresentationP&PIPBHSVI.pdf
Personal Brand PresentationP&PIPBHSVI.pdfHyrum Stoddard VI
 
Episode 264 Snippets: Kyle Payne of the Arizona Diamondbacks
Episode 264 Snippets: Kyle Payne of the Arizona DiamondbacksEpisode 264 Snippets: Kyle Payne of the Arizona Diamondbacks
Episode 264 Snippets: Kyle Payne of the Arizona DiamondbacksNeil Horowitz
 
ADVOCATES ORGANIZATION IN THE PROSPECTIVE OF LAW ENFORCEMENT AND HUMAN RIGHTS...
ADVOCATES ORGANIZATION IN THE PROSPECTIVE OF LAW ENFORCEMENT AND HUMAN RIGHTS...ADVOCATES ORGANIZATION IN THE PROSPECTIVE OF LAW ENFORCEMENT AND HUMAN RIGHTS...
ADVOCATES ORGANIZATION IN THE PROSPECTIVE OF LAW ENFORCEMENT AND HUMAN RIGHTS...AJHSSR Journal
 
How to optimize your linkedin profile by DigiCrow
How to optimize your linkedin profile by DigiCrowHow to optimize your linkedin profile by DigiCrow
How to optimize your linkedin profile by DigiCrowAmit Modi
 
How Facebook Can Turns yours $25 into $2500_ Facebook Ads Mastery.pdf
How Facebook Can Turns yours $25 into $2500_ Facebook Ads Mastery.pdfHow Facebook Can Turns yours $25 into $2500_ Facebook Ads Mastery.pdf
How Facebook Can Turns yours $25 into $2500_ Facebook Ads Mastery.pdfZentechia
 
Start Using Social Media for Small Business
Start Using Social Media for Small BusinessStart Using Social Media for Small Business
Start Using Social Media for Small BusinessSeemaRampersad1
 
Quo Vadis? A Phenomenological Study on Graduated Pantawid Pamilyang Pilipino ...
Quo Vadis? A Phenomenological Study on Graduated Pantawid Pamilyang Pilipino ...Quo Vadis? A Phenomenological Study on Graduated Pantawid Pamilyang Pilipino ...
Quo Vadis? A Phenomenological Study on Graduated Pantawid Pamilyang Pilipino ...AJHSSR Journal
 
Tube Triumph: Your Guide to YouTube Success
Tube Triumph: Your Guide to YouTube SuccessTube Triumph: Your Guide to YouTube Success
Tube Triumph: Your Guide to YouTube SuccessSocioCosmos
 
WE HAVE EVERYTHING YOU NEEDED TO RUN SUCCESSFUL SOCIAL MEDIA ACCOUNTS
WE HAVE EVERYTHING YOU NEEDED TO RUN SUCCESSFUL SOCIAL MEDIA ACCOUNTSWE HAVE EVERYTHING YOU NEEDED TO RUN SUCCESSFUL SOCIAL MEDIA ACCOUNTS
WE HAVE EVERYTHING YOU NEEDED TO RUN SUCCESSFUL SOCIAL MEDIA ACCOUNTSMyInstaHub
 
The effect of Nurse Staffing on Quality of Care and Patient Satisfaction in t...
The effect of Nurse Staffing on Quality of Care and Patient Satisfaction in t...The effect of Nurse Staffing on Quality of Care and Patient Satisfaction in t...
The effect of Nurse Staffing on Quality of Care and Patient Satisfaction in t...AJHSSR Journal
 

Recently uploaded (11)

Cultural Value Orientation in Trans7 Youtube Channel Magazine Show Program an...
Cultural Value Orientation in Trans7 Youtube Channel Magazine Show Program an...Cultural Value Orientation in Trans7 Youtube Channel Magazine Show Program an...
Cultural Value Orientation in Trans7 Youtube Channel Magazine Show Program an...
 
Personal Brand PresentationP&PIPBHSVI.pdf
Personal Brand PresentationP&PIPBHSVI.pdfPersonal Brand PresentationP&PIPBHSVI.pdf
Personal Brand PresentationP&PIPBHSVI.pdf
 
Episode 264 Snippets: Kyle Payne of the Arizona Diamondbacks
Episode 264 Snippets: Kyle Payne of the Arizona DiamondbacksEpisode 264 Snippets: Kyle Payne of the Arizona Diamondbacks
Episode 264 Snippets: Kyle Payne of the Arizona Diamondbacks
 
ADVOCATES ORGANIZATION IN THE PROSPECTIVE OF LAW ENFORCEMENT AND HUMAN RIGHTS...
ADVOCATES ORGANIZATION IN THE PROSPECTIVE OF LAW ENFORCEMENT AND HUMAN RIGHTS...ADVOCATES ORGANIZATION IN THE PROSPECTIVE OF LAW ENFORCEMENT AND HUMAN RIGHTS...
ADVOCATES ORGANIZATION IN THE PROSPECTIVE OF LAW ENFORCEMENT AND HUMAN RIGHTS...
 
How to optimize your linkedin profile by DigiCrow
How to optimize your linkedin profile by DigiCrowHow to optimize your linkedin profile by DigiCrow
How to optimize your linkedin profile by DigiCrow
 
How Facebook Can Turns yours $25 into $2500_ Facebook Ads Mastery.pdf
How Facebook Can Turns yours $25 into $2500_ Facebook Ads Mastery.pdfHow Facebook Can Turns yours $25 into $2500_ Facebook Ads Mastery.pdf
How Facebook Can Turns yours $25 into $2500_ Facebook Ads Mastery.pdf
 
Start Using Social Media for Small Business
Start Using Social Media for Small BusinessStart Using Social Media for Small Business
Start Using Social Media for Small Business
 
Quo Vadis? A Phenomenological Study on Graduated Pantawid Pamilyang Pilipino ...
Quo Vadis? A Phenomenological Study on Graduated Pantawid Pamilyang Pilipino ...Quo Vadis? A Phenomenological Study on Graduated Pantawid Pamilyang Pilipino ...
Quo Vadis? A Phenomenological Study on Graduated Pantawid Pamilyang Pilipino ...
 
Tube Triumph: Your Guide to YouTube Success
Tube Triumph: Your Guide to YouTube SuccessTube Triumph: Your Guide to YouTube Success
Tube Triumph: Your Guide to YouTube Success
 
WE HAVE EVERYTHING YOU NEEDED TO RUN SUCCESSFUL SOCIAL MEDIA ACCOUNTS
WE HAVE EVERYTHING YOU NEEDED TO RUN SUCCESSFUL SOCIAL MEDIA ACCOUNTSWE HAVE EVERYTHING YOU NEEDED TO RUN SUCCESSFUL SOCIAL MEDIA ACCOUNTS
WE HAVE EVERYTHING YOU NEEDED TO RUN SUCCESSFUL SOCIAL MEDIA ACCOUNTS
 
The effect of Nurse Staffing on Quality of Care and Patient Satisfaction in t...
The effect of Nurse Staffing on Quality of Care and Patient Satisfaction in t...The effect of Nurse Staffing on Quality of Care and Patient Satisfaction in t...
The effect of Nurse Staffing on Quality of Care and Patient Satisfaction in t...
 

Cybercrime.ppt

  • 2. CONTENT           INTRODUCTION HISTORY OF CYBER CRIME CATEGORIES OF CYBER CRIME TYEPS OF CYBER CRIME CYBERCRIMES THREATENS NATIONAL SECORITY CYBER SECURITY ADVANTAGES OF CYBER SECURITY SAFETY TIPS TO CYBER CRIME CYBER LAW OF INDIA CONCLUSION
  • 3. INTRODUCTION Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 4. HISTORY OF CYBER CRIME      The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c. In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. The first spam email took place in 1976 when it was sent out over the ARPANT. The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 5. CATEGORIES OF CYBER CRIME We can categorize cyber crime in two ways.  The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.  The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 7. TYPES OF CYBER CRIME  HACKING :- Hacking in simple terms means an illegal intrusion info a computer system and/or network . It is also known as CRACKING. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS Motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services.
  • 8. TYPES OF CYBER CRIME  CHILD PORNOGRAPHY : The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles. How Do They Operate : How do they operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children.
  • 9. TYPES OF CYBER CRIME    DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks. VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc. COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.
  • 10. TYPES OF CYBER CRIME CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc.  SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. 
  • 11. CYBER CRIMES THREATENS NATIONAL SECURITY CYBER CRIMES THREATENS NATIONAL SECURITY IN INDIA Likewise Union home minister Shivraj Patil said that the rising level of cyber crime is an indication of enormous threat to national security. On Google’s social networking site orkut, facebook, have been perplexing authorities . Fan clubs of Underworld Dons like Dawood Ibrahim and Chhota Shakeel and other wanted underworld dons are also doing the rounds on orkut. There is huge potential for damage to national security through cyber attacks. The internet is a means for money bounding and funding terrorist attacks in an organized manner.
  • 13. CYBER SECURITY Cyber Security : Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Cyber security actually preventing the attacks, cyber security. Privacy Policy : Before submitting your name , e-mail , address, on a website look for the sites privacy policy. Keep Software Up to Date: If the seller reduces patches for the software operating system your device ,install them as soon as possible .Installing them will prevent attackers form being able to take advantage. Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your passwords.
  • 14. CYBER SECURITY  DISABLE REMOTE CONNECTIVITY : Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
  • 15. ADVANTAGES OF CYBER SECURITY The cyber security will defend us from critical attacks.  It helps us to browse the site, website.  Internet Security process all the incoming and outgoing data on your computer.  It will defend us from hacks and virus.  Application of cyber security used in our PC needs update every week 
  • 16. SAFETY TIPS TO CYBER CRIME Use antivirus Software  Insert Firewalls  Uninstall unnecessary software  Maintain backup  Check security settings 
  • 17. CYBER LAW OF INDIA Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.
  • 18. CONCLUSION Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.