SlideShare a Scribd company logo
1 of 39
DON’T BE A
VICTIM OF
CYBER CRIME
क्या VIRTUAL वर्ल्ड अच्छी दुनिया है ?
क्या इससे छु पी हुई समस्याओं के बारे में हम जािते हैं ?
JIA’s Story
Based on real incident
 Jia is 15 year daughter of CA Hemant, a teenager her parents did not
allowed her a mobile phone or internet connection .
 She used to surf and FB at cyber café with limited pocket money
 She used fb on her friends mobile.
 Real world me 50 friends par virtual world me 1000 friends
 Her friends name was Richa
 There was a boy in there college who was very famous, Richa used to
admire her.
 Jia bday was coming soon, her dad had promised that on her birthday
 He will give him a laptop and internet connection on his birthday .
 Once she logged in to internet she got loads of
request ..
 She made friendship with a guy name Rahul.
 Rahul : Wanna See you ???
 Jia : hmmm
She buys a webcam
 Rahul invites for a video chat ….
 Unfortunately Rahul's webcam is not working …
 Rahul asks to see more ???
 She denies … Rahul disconnect the call.
Jia did not want to lose Rahul so in next session he agrees to Rahul’s
request
He asks to show more …
Jia Denies .he calls her Stupid Behenjee and disconnects again.
He says you will regret … U are ugly and Stupid.
Next Day Jia’s parents received the video ….
Her video was leaked on internet…
Eventually her Dad complained to Cyber Crime Team and the person was
arrested.…
साइबर क्राइम क्या होता है ?
All criminal activities done using computers, or using internet to steal data or information .
Any offence in which a computer is used is a cyber crime.
Malicious Software's / Programs
social networking sites are owned by private businesses, and that they
make their money by collecting data about individuals and selling that
data on, particularly to third party advertisers
With Advent of Social Media
Cyber crime has grown
leaps & bounds
We can categorize Cyber Crime in 2 Ways
1) The Computer as a Target :
using a computer to attack other computers, e.g
Hacking, virus attacks , DOS attack etc.
2) Computer as a weapon
commit real world crime. e.g. credit card fraud,
pornography, cyber terrorism.
Email & SMS Spoofing.
Similarly received a mail from Jinprabha stating my flight has been rescheduled
Guw – Kol Flight has been rescheduled to 8 AM
Credit Card Frauds
Online Gaming
Free coins
Generator
Website Defamation
Your Smartphone and Tablet Are Vulnerable to Hackers
Common Apps we use ?
True caller collects all the name stored in your phone
Directory and shares it with global database.
How to remove your number from Truecaller
https://www.truecaller.com/unlist
Your profile picture is visible to every person having your contact
number and using this app, whether known by you or not.
If you upload picture in the chat with your friends or groups it
automatically save the picture into your friends phone .
https://web.whatsapp.com/
Blessing or a curse ?
How do I Protect Myself ?
What Cyber awareness Family
does ?
Do’s
Always ask the questions:
•Who can access the information I am putting online?
•Who controls and owns the information I put into a social networking
site?
•What information about me are my contacts passing on to other
people?
•Will my contacts mind if I share information about them with other
people?
•Do I trust everyone with whom I'm connected?
use $7R0NG P455W0RD
Make sure you understand the default privacy settings offered by
the social networking site, and how to change them.
Be careful when accessing your social network account in public
internet spaces. Delete your password and browsing history
POSTING PERSONAL DETAILS
Ask yourself: is it necessary to post the following
information online?
•birth dates
•contact phone numbers
•addresses
•details of family members
•sexual orientation
•education and employment history
Be careful about putting too much information into your
status updates
Going out for movie with parent’s tonite
SHARING ONLINE CONTENT
It's easy to share a link to a website and get
your friend's attention. But who else will be
paying attention, and what kind of reaction
will they have? If you share (or "like") a site
that opposes some position taken by your
government, for example, agents of that
government very might well take an interest
and target you for additional surveillance or
direct persecution.
REVEALING YOUR LOCATION
Just checked in
SHARING VIDEOS AND PHOTOS
INSTANT CHATS
Thanks

More Related Content

What's hot

What's hot (19)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
 
Cyber Crime - What is it ?
Cyber Crime - What is it ?Cyber Crime - What is it ?
Cyber Crime - What is it ?
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Facebook
FacebookFacebook
Facebook
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school level
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 

Viewers also liked

What Others Say
What Others SayWhat Others Say
What Others Say
jeffadixon
 
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...Introduction To Server Virtualisation Planning And Implementing A Virtualisat...
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...
Alan McSweeney
 
Proposal for cctv cameras
Proposal for cctv camerasProposal for cctv cameras
Proposal for cctv cameras
Mritunjay Kumar
 

Viewers also liked (11)

What Others Say
What Others SayWhat Others Say
What Others Say
 
Body
BodyBody
Body
 
Jeff Dixon Successful End To End Transformations
Jeff Dixon Successful End To End TransformationsJeff Dixon Successful End To End Transformations
Jeff Dixon Successful End To End Transformations
 
Preso On Jeff Dixon Final
Preso On Jeff Dixon FinalPreso On Jeff Dixon Final
Preso On Jeff Dixon Final
 
Training
TrainingTraining
Training
 
Final Mba Thesis Presentatie Hazenberg V1.01
Final Mba Thesis Presentatie Hazenberg V1.01Final Mba Thesis Presentatie Hazenberg V1.01
Final Mba Thesis Presentatie Hazenberg V1.01
 
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...Introduction To Server Virtualisation Planning And Implementing A Virtualisat...
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...
 
Proposal for cctv cameras
Proposal for cctv camerasProposal for cctv cameras
Proposal for cctv cameras
 
Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera
 
Software Proposal Portal Inc.
Software Proposal Portal Inc.Software Proposal Portal Inc.
Software Proposal Portal Inc.
 
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
 

Similar to Cyber Crime

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
Ollie Bray
 
CYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfCYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdf
annaielectronicsvill
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
adewolfe
 

Similar to Cyber Crime (20)

Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Let's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital WorldLet's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital World
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Kealie int safe
Kealie int safeKealie int safe
Kealie int safe
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital drama
Digital dramaDigital drama
Digital drama
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdf
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
CYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfCYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdf
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 

More from Revolucion

4 sg 2.5.1_installation
4 sg 2.5.1_installation4 sg 2.5.1_installation
4 sg 2.5.1_installation
Revolucion
 
3 storegrid 2.5.1-biz_edition
3 storegrid 2.5.1-biz_edition3 storegrid 2.5.1-biz_edition
3 storegrid 2.5.1-biz_edition
Revolucion
 
Constructing Backup Server Using DATA Folder
Constructing Backup Server Using DATA FolderConstructing Backup Server Using DATA Folder
Constructing Backup Server Using DATA Folder
Revolucion
 
Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its Relevance
Revolucion
 
Replication Management
Replication ManagementReplication Management
Replication Management
Revolucion
 
Installation of SG using Buffalo NAS
Installation of SG using Buffalo NASInstallation of SG using Buffalo NAS
Installation of SG using Buffalo NAS
Revolucion
 
Storegrid 2.5.1 Biz Edition
Storegrid 2.5.1 Biz EditionStoregrid 2.5.1 Biz Edition
Storegrid 2.5.1 Biz Edition
Revolucion
 
StoreGrid : MYSQL Backup
StoreGrid : MYSQL BackupStoreGrid : MYSQL Backup
StoreGrid : MYSQL Backup
Revolucion
 
Ehd Sg Installation&Restore
Ehd Sg Installation&RestoreEhd Sg Installation&Restore
Ehd Sg Installation&Restore
Revolucion
 
StoreGrid : Replication Server
StoreGrid : Replication ServerStoreGrid : Replication Server
StoreGrid : Replication Server
Revolucion
 
StoreGrid : Restore & Recovery
StoreGrid : Restore & RecoveryStoreGrid : Restore & Recovery
StoreGrid : Restore & Recovery
Revolucion
 
StoreGrid Deployment Scenarios
StoreGrid Deployment ScenariosStoreGrid Deployment Scenarios
StoreGrid Deployment Scenarios
Revolucion
 
StoreGrid Installation
StoreGrid InstallationStoreGrid Installation
StoreGrid Installation
Revolucion
 

More from Revolucion (20)

Quick Heal Terminator.
Quick Heal Terminator.Quick Heal Terminator.
Quick Heal Terminator.
 
Sql
SqlSql
Sql
 
B3: Backup & its relevance
B3: Backup & its relevanceB3: Backup & its relevance
B3: Backup & its relevance
 
4 sg 2.5.1_installation
4 sg 2.5.1_installation4 sg 2.5.1_installation
4 sg 2.5.1_installation
 
3 storegrid 2.5.1-biz_edition
3 storegrid 2.5.1-biz_edition3 storegrid 2.5.1-biz_edition
3 storegrid 2.5.1-biz_edition
 
1 backup
1 backup1 backup
1 backup
 
Constructing Backup Server Using DATA Folder
Constructing Backup Server Using DATA FolderConstructing Backup Server Using DATA Folder
Constructing Backup Server Using DATA Folder
 
Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its Relevance
 
StoreGrid 2.5.1 Installation Guide
StoreGrid 2.5.1 Installation GuideStoreGrid 2.5.1 Installation Guide
StoreGrid 2.5.1 Installation Guide
 
Replication Management
Replication ManagementReplication Management
Replication Management
 
Sgoutput
SgoutputSgoutput
Sgoutput
 
Installation of SG using Buffalo NAS
Installation of SG using Buffalo NASInstallation of SG using Buffalo NAS
Installation of SG using Buffalo NAS
 
Storegrid 2.5.1 Biz Edition
Storegrid 2.5.1 Biz EditionStoregrid 2.5.1 Biz Edition
Storegrid 2.5.1 Biz Edition
 
StoreGrid : MYSQL Backup
StoreGrid : MYSQL BackupStoreGrid : MYSQL Backup
StoreGrid : MYSQL Backup
 
Ehd Sg Installation&Restore
Ehd Sg Installation&RestoreEhd Sg Installation&Restore
Ehd Sg Installation&Restore
 
Adv Sg
Adv SgAdv Sg
Adv Sg
 
StoreGrid : Replication Server
StoreGrid : Replication ServerStoreGrid : Replication Server
StoreGrid : Replication Server
 
StoreGrid : Restore & Recovery
StoreGrid : Restore & RecoveryStoreGrid : Restore & Recovery
StoreGrid : Restore & Recovery
 
StoreGrid Deployment Scenarios
StoreGrid Deployment ScenariosStoreGrid Deployment Scenarios
StoreGrid Deployment Scenarios
 
StoreGrid Installation
StoreGrid InstallationStoreGrid Installation
StoreGrid Installation
 

Recently uploaded

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 

Recently uploaded (20)

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 

Cyber Crime

  • 1. DON’T BE A VICTIM OF CYBER CRIME
  • 2. क्या VIRTUAL वर्ल्ड अच्छी दुनिया है ? क्या इससे छु पी हुई समस्याओं के बारे में हम जािते हैं ?
  • 3.
  • 4. JIA’s Story Based on real incident
  • 5.  Jia is 15 year daughter of CA Hemant, a teenager her parents did not allowed her a mobile phone or internet connection .  She used to surf and FB at cyber café with limited pocket money  She used fb on her friends mobile.  Real world me 50 friends par virtual world me 1000 friends  Her friends name was Richa  There was a boy in there college who was very famous, Richa used to admire her.  Jia bday was coming soon, her dad had promised that on her birthday  He will give him a laptop and internet connection on his birthday .
  • 6.  Once she logged in to internet she got loads of request ..  She made friendship with a guy name Rahul.
  • 7.  Rahul : Wanna See you ???  Jia : hmmm She buys a webcam  Rahul invites for a video chat ….  Unfortunately Rahul's webcam is not working …  Rahul asks to see more ???  She denies … Rahul disconnect the call.
  • 8. Jia did not want to lose Rahul so in next session he agrees to Rahul’s request He asks to show more … Jia Denies .he calls her Stupid Behenjee and disconnects again. He says you will regret … U are ugly and Stupid. Next Day Jia’s parents received the video …. Her video was leaked on internet… Eventually her Dad complained to Cyber Crime Team and the person was arrested.…
  • 10. All criminal activities done using computers, or using internet to steal data or information . Any offence in which a computer is used is a cyber crime. Malicious Software's / Programs
  • 11. social networking sites are owned by private businesses, and that they make their money by collecting data about individuals and selling that data on, particularly to third party advertisers With Advent of Social Media Cyber crime has grown leaps & bounds
  • 12. We can categorize Cyber Crime in 2 Ways 1) The Computer as a Target : using a computer to attack other computers, e.g Hacking, virus attacks , DOS attack etc.
  • 13. 2) Computer as a weapon commit real world crime. e.g. credit card fraud, pornography, cyber terrorism.
  • 14.
  • 15. Email & SMS Spoofing.
  • 16.
  • 17. Similarly received a mail from Jinprabha stating my flight has been rescheduled Guw – Kol Flight has been rescheduled to 8 AM
  • 21. Your Smartphone and Tablet Are Vulnerable to Hackers
  • 22. Common Apps we use ? True caller collects all the name stored in your phone Directory and shares it with global database.
  • 23. How to remove your number from Truecaller https://www.truecaller.com/unlist
  • 24. Your profile picture is visible to every person having your contact number and using this app, whether known by you or not. If you upload picture in the chat with your friends or groups it automatically save the picture into your friends phone .
  • 26. How do I Protect Myself ?
  • 27. What Cyber awareness Family does ?
  • 28. Do’s Always ask the questions: •Who can access the information I am putting online? •Who controls and owns the information I put into a social networking site? •What information about me are my contacts passing on to other people? •Will my contacts mind if I share information about them with other people? •Do I trust everyone with whom I'm connected?
  • 30. Make sure you understand the default privacy settings offered by the social networking site, and how to change them.
  • 31. Be careful when accessing your social network account in public internet spaces. Delete your password and browsing history
  • 32.
  • 33. POSTING PERSONAL DETAILS Ask yourself: is it necessary to post the following information online? •birth dates •contact phone numbers •addresses •details of family members •sexual orientation •education and employment history
  • 34. Be careful about putting too much information into your status updates Going out for movie with parent’s tonite
  • 35. SHARING ONLINE CONTENT It's easy to share a link to a website and get your friend's attention. But who else will be paying attention, and what kind of reaction will they have? If you share (or "like") a site that opposes some position taken by your government, for example, agents of that government very might well take an interest and target you for additional surveillance or direct persecution.

Editor's Notes

  1. aajkal ke youngsters infact hum bhi 2 tarah ki jindagi jee rahe hai, ek hamari real life aur dusri hamari virtual life yaani internet ki duniya. world wide web ek alag hi duniya hai. ek waqt aisa tha jab ham hamaari feelings apne dost ya kareebi ristedaaron ke saath hi share karte the lekin aaj feeling to baad me aata hai par uska status facebook pe pehle update ho jaata hai . Aaj aap internet ke maadhyam se kisi bhi shahr se kisi bhi shahr me kisi bhi vyakti se ek click ki sahata se dosti kar sakte hai . Virtual world hamaare real world se jyada important ho aya hai . Hum aapko is virtual world me le jaana chahte hai par thodi saavdhani se kyuki world wide web ke jaal me fasna bahut aasan hai par iska impact bahut long lasting hai .