SlideShare a Scribd company logo
1 of 78
Download to read offline
Cyber Space
Opportunities & Threat
Awareness
Class
Jayakumar PP
9847435193
Evolution of Cyber space
Computerisation
WHAT IS IOT?
• The Internet of Things (IoT) is the network of physical
objects—devices, vehicles, buildings and other items
embedded with electronics, software, sensors, and
network connectivity—that enables these objects to
collect and exchange data.
What is IoT?
IOT?
In simple words, Internet of Things (IoT) is
an ecosystem of connected physical objects
that are accessible through the internet.
• 1969 – Jan 2 – ARPANET – Four centers
• India joined in the year 1995 –Aug 15
• Instant Communications, News Reference, Resea
Entertainment, Shopping, etc, etc..
• 1972 Ray Tomlinson invents eMail.
• 1983 Invents Internet Protocol
• 1989 first World Wide Web Developed
• 1994 First G-Web Browser Developed (Mosaic).
• 1995 Internet open for commercial purpose.
The Internet is a Great Place
Evolution of Internet connectivity
IOT IN DAILY LIFE…
• eGovernance
• Social Media site
• Micro Blogs
• Mobile Apps
• Web Sites
• Internet has: porn sites
– hate sites pirated software, music, movies
– viruses and malicious downloads, spyware
– scams and data collection sites
• Harassment and legal/financial risks
Things Around Us!!!
e-Governance & Citizen Centric
Service Delivery
e-Governance
Services………..
Examples of e-Services – G2C
• Birth Certificate
• Health Care
• School Admission
• Scholarships
• e-Learning
• Examination Results
• Employment Services
• Vehicle Registration
• Driver’s License
• Passport/Visa
• Agriculture
• Land Record
• Property Registration
• Marriage Certificates
• Taxes
• Utility Services
• Municipality Services
• Pensions
• Insurance
• Health Care
• Death Certificate
from Cradle to Grave……
Threats in Cyber Space
• www.classmates.com – 1995 Randy Conrads
• Facebook & Orkut in the year 2004
• Twitter in the year 2006
• Google plus in the year 2011
1. Information Technology Act
2000
2. Indian Penal Code – 1860
3. Indian Copyright Act – 1957
• IT Act Applicable to all states of
India including Jammu & Kashmir
• It is applicable to any violation of the
provisions of this Act done by any
person anywhere in the world.
Cyber Crime Against
Women
BULLYING
Pornography
Morphing
Email
Spoofing
Defamation
Online Game
Online
Grooming
Threats Against Women & Children in Cyber Space
Police Contact and Help Line Numbers
Cyber Crime Reporting Portal
Cyber Bullying
Mobile phone harrassment is also called
BULLYING, which is a general term to describe any
type of unwanted telephone calls or messages, or
picture messages, intended to cause upset and
grief !!! – Sec 499, 509 of IPC and 120(o) KP Act .
✓Word, gesture or act intended to insult the modesty of a
woman.
✓Shall be punished with simple imprisonment for a term
which may extend to one year, or with fine, or with both
Cyber Grooming
Similarly, Section 419 of the IPC could also be
applied with the same qualification that it must
be making a pecuniary(financial) benefit to it.
Under Section 465 of the Act, a person committing
forgery shall be imprisoned for up to two years
and shall also liable to pay fine
➢ Section 499/500 IPC: When fake profile is posted with defamatory
content with an intention to defame other, the offence punishable
under Section 499/500 IPC (defamation) is attracted.
Details Required
➢ URL of the Suspect FB Account
➢ Screen Shot of FB Account – Two or more
➢ ID Proof & Photo of the Complainant
➢ URL & Screen Shot of the any post related with the
Social Media – Fake Profile
Making a fake account of another person
Section 66-D of Information Technology Act 2000, which was
subsequently amended in 2008, states that “whoever by
means of any communication device or computer
resource cheats by personating, shall be punished with
imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which
may extend to one lakh rupees.”[1]
. The real face behind the fake profile can be traced through
IP address. Internet Protocol address (IP address) is a
numeric label – a set of four numbers (Eg. 202.54.30.1) –
that is assigned to every device (e.g., computer, printer)
participating on the internet
Social Media – Fake Account
Online Game
❖Addiction
❖Loss of interest
❖Underdeveloped physical condition
❖Decline in personal hygiene
❖Declining social activity
Roblox - popular with kids, teens and even adults, which allows users
to interact with one another in this virtual world, play games and also
engage in role play.
My Friend Cayla - smart toy looks like an innocent baby doll with
pretty features, lovely hair, a sweet smile, and an equally adorable outfit.
Blue Whale -This social media game dares its players to also
participate in a series of tasks which are detrimental to their health and can
also cause them great harm.
Fire Fairy - This online prank targets younger children and is
modelled after the animated series, It gives dangerous instructions to
unsuspecting kids on how they can become a magical “fire fairy”.
Cloud Pets -These innocent-looking smart toys which come as a
cuddly elephant, bear, cat, rabbit, dog or unicorn can record audio
messages via a mobile app and replay them for your child’s entertainment.
The Pass Out Challenge. The Salt and Ice Challenge
The Fire Challenge The Cutting Challenge
Dangerous Online Games
Online Financial Fradus
Details Required
❖ Card No (Credit/Debit)
❖ Bank & Account No
❖ Suspect Mobile Number (Call Received)
❖ Transaction details (Date, Time)
❖ Transaction ID(SMS), Amount, Wallet, Bank, etc.
Collect above details at the earliest and forward to
Cyber Cell
❖ Whatsapp 9497976000,9497981288,9847435193
❖ We can Collect, KYC, Mobile SDR & CDR, CAF
Online Financial Fradus
Unauthorized access of
❑Computer & Its resources
❑Telecommunication devices
❑Telecommunication media, etc.
Section 65 Tampering with computer Source
document.
Section 66 – Hacking with computer systems –
including all activities mentioned in the sec 43
Imprisonment up to three years, or with
fine which may extend up to two lakh
rupees, or with both
41
42
Hacking : - Hacker can be used to denote a
computer expert engaged in solving complex
problems on computers or persons securing
unauthorized access, looks around , collects
information and leaves without a trace. Hacking
done with malicious intention is called cracker.
Phreaker:- is a person who manipulates and
disrupts telecomm systems. Today
telecommunication systems has also been
computerized.
43
❖ The worst passwords to use are the ones
that come to mind first -- name, spouse's name,
maiden name, pets, children's name, even
street addresses, etc.
❖ The best passwords mix numbers with upper
and lowercase letters.
❖ A password that is not found in the dictionary
is even better. There are programs that will try
every word in the dictionary in an effort to crack
your security. Changing passwords regularly
❖
Password Breaking!!!
Trusted Friends
Trusted friends are friends you can reach out to if you
ever get locked out of your Facebook account .
Secure Browsing (https)
Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
Login Notifications
Login Notifications are an opt-in security feature where
alerts are sent to you each time your account is
accessed from a new device. Add a Mobile Number.
Login Approvals : Similar to Login Notifications , but
need security code to login.
Password, Message & Links, Personal Information, Browser
Security & Computer Security
1. Getting started with 2-step verification
2. Check the forwarding and delegation in mail
settings tab.
3. Update your secondary email address and your
security question, and provide a mobile phone for SMS-
based account recovery
4. Secure Browsing (https)
Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
5. Check recent IP addresses accessing the account
6. Backup your Gmail Account- (Thunderbird, Outlook , Pocomail).
Password, Message & Links, Personal Information, Browser
Security & Computer Security
47
True Caller
UC Browser
Shareit
Clean Master
A person following another especially women and
continuously harassing through online
Cyber Stalking is generally considered as use of the
Internet, e-mail or other electronic communications
device to stalk or harass a person.
Sec. 499, 503,509 IPC & Section 120(o) of KP Act.
Punishable with simple imprisonment for a term which may extend to two
years, or with fine, or with both.
Sec 503 IPC Sending threatening messages by e-
mail
Sec 499 IPC Sending defamatory messages by e-
mail
• Sexual Harassment
• Obsession for love
• Revenge & Hate
• Ego & Power Trips
➢Their main targets are the mostly females,
children, emotionally weak or unstable, etc. It is
believed that Over 75% of the victims are female
• Publishing sexual activities in the form of
visuals, audio or through text to raise
erotic feelings rather than aesthetic.
✓ New concept called as SEXTING
✓ Sending sexually explicit pictures by cell phone or
Email
51
52
Section 67 – Publishing of information which
is obscene in electronic form. 3 years or with fine
not exceeding 5 lakh
Sec 67 A - Punishment for publishing or transmitting of
material containing sexually explicit act, etc., in electronic
form. five years and with fine which may extend to ten lakh
rupees
Sec 119 of KP Act - Punishment for atrocities against
women. – (1) Any person who,—
(a) performs, in public places, any sexual gestures or acts
degrading the dignity of women; or
24(b) takes photographs or records videos or propagates them at
any place in a manner affecting the reasonable privacy of women.
Cases : Ramankari Teacher, Chengannur Beauty & Banlglore student,etc.
3 yrs imprisonment & Fine
• Put utmost care in selecting friends – All kinds of
Criminals are in this Social media.
• Don’t post family information publicly
• Don’t post, share and like defamatory comments
and contents.
• Don’t post dirty videos
• Don’t post live pictures while u r travelling.
• Note : Once u posted something, it will not taken
back from the Cyber World.
• Founders: Larry Page, Sergey Brin – 1998, 2004 -
Mark Zuckerberg, Dustin Moskovitz, W3C-Tim
Berners-Lee
• Fake Profiles – 499,500,509 IPC– 3 yrs + 2
lakhs.
• Defamatory posting – 3 yrs + Fine.
• Posting private parts of a person – Sec 66E -3
yrs. + 2 lakhs.
• Sexual messages & Audios – Sec 67 -3 yrs + 5
lakhs.
• Posting Sexual videos – Sec 67 A – 5 yrs + 10
lakh ( 7 yrs + 10 lakhs).
• Posting and downloading sexual videos of
children's – Sec 67 B - 5 yrs + 10 lakh ( 7 yrs +
10 lakhs).
Publishing statements lowering the
reputation of persons.
When someone publishes defamatory
matter about someone on a website or
sends e-mails, pictures, etc. containing
defamatory information to all of that
person's friends or on the internet.
Sec 499,500,503.
In case of sexual abuse against
women. Sec 509 & 354(a) IPC
Social Media & Cyber Crime
Ph : 0477 -2230804 Email : cybrcelalpy.pol@kerala.gov.in
Ph : 0477 -2230804 Email : cybrcelalpy.pol@kerala.gov.in
Phishing – Facebook Page
➢Criminal creates a “mirror” website that
looks like a legitimate website
➢They fool people into going to that site,
which transmits your username or
password to the them
➢Using pop-up windows to conceal the
real address in the victim’s address bar
➢“Pharming” victim redirected to a scam
website when the victim types in the
real address
Deceptive Login Page
➢Online Lottery Scam
➢Online Job Offers
➢ATM Fraud
➢Phishing
➢Russian Wife Scam
Appointment Letter
January 23, 2015
January 23, 2015 HI TECH CRIME ENQUIRY CELL
January 23, 2015 HI TECH CRIME ENQUIRY CELL
VISA
January 23, 2015 HI TECH CRIME ENQUIRY CELL
Section 468. Forgery for purpose of cheating
Whoever commits forgery, intending that the
document or Electronic Record forged shall be used
for the purpose of cheating, shall be punished with
imprisonment of either description for a term which
may extend to seven years, and shall also be liable to
fine.
Section 420. Cheating and dishonestly inducing
delivery of property
shall be punished with imprisonment of either
description for a term which may extend to seven
years, and shall also be liable to fine.
➢ Cyber Piracy is defined as art of making illegal
copies of Music, Books, software etc for the
purpose of sale.
➢ The major form of piracy on the net is violation
of copyrights and trade marks. A part of this piracy
had also been cyber squatting of domain names.
➢ Shall be punishable under section. 51, 63, 63B
of Indian Copyright Act.
• Where we stand
– Twentieth in top 20 pirating countries
– At 73%, behind China (92%), Vietnam (92%),
Indonesia (88%) and Russia (87%)
– Losses at $367 million
• Benefits of piracy control
– Reduction of piracy by 10% will
• Promote innovation
• Add $1.2 billion to GDP
• Create 48,000 jobs
• Add $92 million to tax revenues
IOT CHALLENGES..
Threat vs. Opportunity
• If misunderstood and misconfigured,
misused Technology poses risk to our data,
privacy, and safety
• If understood , secured, efficient use of
Technology will enhance communications,
lifestyle, and delivery of services
The Biggest Investment is
“Investment in as much of yourself as you can, you are
your own biggest by far.
✓ Are you wiser to day than yesterday, or last day , or last
year , or five years ago
✓ Are you taking good care to be physically and mentally
fit.
Jayakumar PP
Ethical Hacker
78
“Awareness about Cyber-crime threats is the best
tool to avoid of being a victim”.
Jayakumar PP
9847435193
jkambala@gmail.com
https://www.facebook.com/jayakumar.purushan
https://www.linkedin.com/pub/jayakumar-pp/65/59b/773
http://www.slideshare.net/jayakumarpurushan

More Related Content

What's hot

Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school levelAbhinav Saxena
 

What's hot (20)

Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school level
 

Similar to Cyber Space Threats and Opportunities

Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxSahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxSahilMishra81
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Adv Prashant Mali
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Adv Prashant Mali
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 

Similar to Cyber Space Threats and Opportunities (20)

Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 

More from Jayakumar PP

Financial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial FraudsFinancial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial FraudsJayakumar PP
 
Blockchain technology and logistics management
Blockchain technology and logistics managementBlockchain technology and logistics management
Blockchain technology and logistics managementJayakumar PP
 
Akshaya Banking Kiosk
Akshaya Banking KioskAkshaya Banking Kiosk
Akshaya Banking KioskJayakumar PP
 
Akshaya Project of Government of Kerala
Akshaya Project of Government of KeralaAkshaya Project of Government of Kerala
Akshaya Project of Government of KeralaJayakumar PP
 
Akshaya down the years
Akshaya down the yearsAkshaya down the years
Akshaya down the yearsJayakumar PP
 
IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT EvolutionJayakumar PP
 
Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software ProjectsJayakumar PP
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crimeJayakumar PP
 

More from Jayakumar PP (9)

Financial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial FraudsFinancial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial Frauds
 
Blockchain technology and logistics management
Blockchain technology and logistics managementBlockchain technology and logistics management
Blockchain technology and logistics management
 
Akshaya Banking Kiosk
Akshaya Banking KioskAkshaya Banking Kiosk
Akshaya Banking Kiosk
 
Akshaya Project of Government of Kerala
Akshaya Project of Government of KeralaAkshaya Project of Government of Kerala
Akshaya Project of Government of Kerala
 
Akshaya down the years
Akshaya down the yearsAkshaya down the years
Akshaya down the years
 
IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT Evolution
 
CCTNS
CCTNS CCTNS
CCTNS
 
Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software Projects
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crime
 

Recently uploaded

Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 

Cyber Space Threats and Opportunities

  • 1. Cyber Space Opportunities & Threat Awareness Class Jayakumar PP 9847435193
  • 2. Evolution of Cyber space Computerisation
  • 4. • The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity—that enables these objects to collect and exchange data. What is IoT? IOT? In simple words, Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through the internet.
  • 5. • 1969 – Jan 2 – ARPANET – Four centers • India joined in the year 1995 –Aug 15 • Instant Communications, News Reference, Resea Entertainment, Shopping, etc, etc.. • 1972 Ray Tomlinson invents eMail. • 1983 Invents Internet Protocol • 1989 first World Wide Web Developed • 1994 First G-Web Browser Developed (Mosaic). • 1995 Internet open for commercial purpose. The Internet is a Great Place
  • 6. Evolution of Internet connectivity
  • 7.
  • 8.
  • 9. IOT IN DAILY LIFE…
  • 10.
  • 11.
  • 12.
  • 13. • eGovernance • Social Media site • Micro Blogs • Mobile Apps • Web Sites • Internet has: porn sites – hate sites pirated software, music, movies – viruses and malicious downloads, spyware – scams and data collection sites • Harassment and legal/financial risks Things Around Us!!!
  • 14. e-Governance & Citizen Centric Service Delivery
  • 16. Examples of e-Services – G2C • Birth Certificate • Health Care • School Admission • Scholarships • e-Learning • Examination Results • Employment Services • Vehicle Registration • Driver’s License • Passport/Visa • Agriculture • Land Record • Property Registration • Marriage Certificates • Taxes • Utility Services • Municipality Services • Pensions • Insurance • Health Care • Death Certificate from Cradle to Grave……
  • 18.
  • 19. • www.classmates.com – 1995 Randy Conrads • Facebook & Orkut in the year 2004 • Twitter in the year 2006 • Google plus in the year 2011
  • 20. 1. Information Technology Act 2000 2. Indian Penal Code – 1860 3. Indian Copyright Act – 1957 • IT Act Applicable to all states of India including Jammu & Kashmir • It is applicable to any violation of the provisions of this Act done by any person anywhere in the world.
  • 21.
  • 22. Cyber Crime Against Women BULLYING Pornography Morphing Email Spoofing Defamation Online Game Online Grooming Threats Against Women & Children in Cyber Space
  • 23.
  • 24.
  • 25. Police Contact and Help Line Numbers
  • 28. Mobile phone harrassment is also called BULLYING, which is a general term to describe any type of unwanted telephone calls or messages, or picture messages, intended to cause upset and grief !!! – Sec 499, 509 of IPC and 120(o) KP Act . ✓Word, gesture or act intended to insult the modesty of a woman. ✓Shall be punished with simple imprisonment for a term which may extend to one year, or with fine, or with both
  • 30.
  • 31. Similarly, Section 419 of the IPC could also be applied with the same qualification that it must be making a pecuniary(financial) benefit to it. Under Section 465 of the Act, a person committing forgery shall be imprisoned for up to two years and shall also liable to pay fine ➢ Section 499/500 IPC: When fake profile is posted with defamatory content with an intention to defame other, the offence punishable under Section 499/500 IPC (defamation) is attracted. Details Required ➢ URL of the Suspect FB Account ➢ Screen Shot of FB Account – Two or more ➢ ID Proof & Photo of the Complainant ➢ URL & Screen Shot of the any post related with the Social Media – Fake Profile
  • 32. Making a fake account of another person Section 66-D of Information Technology Act 2000, which was subsequently amended in 2008, states that “whoever by means of any communication device or computer resource cheats by personating, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.”[1] . The real face behind the fake profile can be traced through IP address. Internet Protocol address (IP address) is a numeric label – a set of four numbers (Eg. 202.54.30.1) – that is assigned to every device (e.g., computer, printer) participating on the internet Social Media – Fake Account
  • 33. Online Game ❖Addiction ❖Loss of interest ❖Underdeveloped physical condition ❖Decline in personal hygiene ❖Declining social activity
  • 34. Roblox - popular with kids, teens and even adults, which allows users to interact with one another in this virtual world, play games and also engage in role play. My Friend Cayla - smart toy looks like an innocent baby doll with pretty features, lovely hair, a sweet smile, and an equally adorable outfit. Blue Whale -This social media game dares its players to also participate in a series of tasks which are detrimental to their health and can also cause them great harm. Fire Fairy - This online prank targets younger children and is modelled after the animated series, It gives dangerous instructions to unsuspecting kids on how they can become a magical “fire fairy”. Cloud Pets -These innocent-looking smart toys which come as a cuddly elephant, bear, cat, rabbit, dog or unicorn can record audio messages via a mobile app and replay them for your child’s entertainment. The Pass Out Challenge. The Salt and Ice Challenge The Fire Challenge The Cutting Challenge Dangerous Online Games
  • 36. Details Required ❖ Card No (Credit/Debit) ❖ Bank & Account No ❖ Suspect Mobile Number (Call Received) ❖ Transaction details (Date, Time) ❖ Transaction ID(SMS), Amount, Wallet, Bank, etc. Collect above details at the earliest and forward to Cyber Cell ❖ Whatsapp 9497976000,9497981288,9847435193 ❖ We can Collect, KYC, Mobile SDR & CDR, CAF Online Financial Fradus
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Unauthorized access of ❑Computer & Its resources ❑Telecommunication devices ❑Telecommunication media, etc. Section 65 Tampering with computer Source document. Section 66 – Hacking with computer systems – including all activities mentioned in the sec 43 Imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both 41
  • 42. 42 Hacking : - Hacker can be used to denote a computer expert engaged in solving complex problems on computers or persons securing unauthorized access, looks around , collects information and leaves without a trace. Hacking done with malicious intention is called cracker. Phreaker:- is a person who manipulates and disrupts telecomm systems. Today telecommunication systems has also been computerized.
  • 43. 43 ❖ The worst passwords to use are the ones that come to mind first -- name, spouse's name, maiden name, pets, children's name, even street addresses, etc. ❖ The best passwords mix numbers with upper and lowercase letters. ❖ A password that is not found in the dictionary is even better. There are programs that will try every word in the dictionary in an effort to crack your security. Changing passwords regularly ❖
  • 45. Trusted Friends Trusted friends are friends you can reach out to if you ever get locked out of your Facebook account . Secure Browsing (https) Your traffic (i.e. all of your activity) on Facebook becomes encrypted Login Notifications Login Notifications are an opt-in security feature where alerts are sent to you each time your account is accessed from a new device. Add a Mobile Number. Login Approvals : Similar to Login Notifications , but need security code to login. Password, Message & Links, Personal Information, Browser Security & Computer Security
  • 46. 1. Getting started with 2-step verification 2. Check the forwarding and delegation in mail settings tab. 3. Update your secondary email address and your security question, and provide a mobile phone for SMS- based account recovery 4. Secure Browsing (https) Your traffic (i.e. all of your activity) on Facebook becomes encrypted 5. Check recent IP addresses accessing the account 6. Backup your Gmail Account- (Thunderbird, Outlook , Pocomail). Password, Message & Links, Personal Information, Browser Security & Computer Security
  • 47. 47
  • 49. A person following another especially women and continuously harassing through online Cyber Stalking is generally considered as use of the Internet, e-mail or other electronic communications device to stalk or harass a person. Sec. 499, 503,509 IPC & Section 120(o) of KP Act. Punishable with simple imprisonment for a term which may extend to two years, or with fine, or with both. Sec 503 IPC Sending threatening messages by e- mail Sec 499 IPC Sending defamatory messages by e- mail
  • 50. • Sexual Harassment • Obsession for love • Revenge & Hate • Ego & Power Trips ➢Their main targets are the mostly females, children, emotionally weak or unstable, etc. It is believed that Over 75% of the victims are female
  • 51. • Publishing sexual activities in the form of visuals, audio or through text to raise erotic feelings rather than aesthetic. ✓ New concept called as SEXTING ✓ Sending sexually explicit pictures by cell phone or Email 51
  • 52. 52 Section 67 – Publishing of information which is obscene in electronic form. 3 years or with fine not exceeding 5 lakh Sec 67 A - Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form. five years and with fine which may extend to ten lakh rupees Sec 119 of KP Act - Punishment for atrocities against women. – (1) Any person who,— (a) performs, in public places, any sexual gestures or acts degrading the dignity of women; or 24(b) takes photographs or records videos or propagates them at any place in a manner affecting the reasonable privacy of women. Cases : Ramankari Teacher, Chengannur Beauty & Banlglore student,etc. 3 yrs imprisonment & Fine
  • 53. • Put utmost care in selecting friends – All kinds of Criminals are in this Social media. • Don’t post family information publicly • Don’t post, share and like defamatory comments and contents. • Don’t post dirty videos • Don’t post live pictures while u r travelling. • Note : Once u posted something, it will not taken back from the Cyber World. • Founders: Larry Page, Sergey Brin – 1998, 2004 - Mark Zuckerberg, Dustin Moskovitz, W3C-Tim Berners-Lee
  • 54. • Fake Profiles – 499,500,509 IPC– 3 yrs + 2 lakhs. • Defamatory posting – 3 yrs + Fine. • Posting private parts of a person – Sec 66E -3 yrs. + 2 lakhs. • Sexual messages & Audios – Sec 67 -3 yrs + 5 lakhs. • Posting Sexual videos – Sec 67 A – 5 yrs + 10 lakh ( 7 yrs + 10 lakhs). • Posting and downloading sexual videos of children's – Sec 67 B - 5 yrs + 10 lakh ( 7 yrs + 10 lakhs).
  • 55.
  • 56.
  • 57. Publishing statements lowering the reputation of persons. When someone publishes defamatory matter about someone on a website or sends e-mails, pictures, etc. containing defamatory information to all of that person's friends or on the internet. Sec 499,500,503. In case of sexual abuse against women. Sec 509 & 354(a) IPC
  • 58. Social Media & Cyber Crime
  • 59. Ph : 0477 -2230804 Email : cybrcelalpy.pol@kerala.gov.in
  • 60. Ph : 0477 -2230804 Email : cybrcelalpy.pol@kerala.gov.in
  • 62.
  • 63. ➢Criminal creates a “mirror” website that looks like a legitimate website ➢They fool people into going to that site, which transmits your username or password to the them ➢Using pop-up windows to conceal the real address in the victim’s address bar ➢“Pharming” victim redirected to a scam website when the victim types in the real address
  • 64.
  • 66. ➢Online Lottery Scam ➢Online Job Offers ➢ATM Fraud ➢Phishing ➢Russian Wife Scam
  • 68. January 23, 2015 HI TECH CRIME ENQUIRY CELL
  • 69. January 23, 2015 HI TECH CRIME ENQUIRY CELL VISA
  • 70. January 23, 2015 HI TECH CRIME ENQUIRY CELL
  • 71. Section 468. Forgery for purpose of cheating Whoever commits forgery, intending that the document or Electronic Record forged shall be used for the purpose of cheating, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine. Section 420. Cheating and dishonestly inducing delivery of property shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine.
  • 72. ➢ Cyber Piracy is defined as art of making illegal copies of Music, Books, software etc for the purpose of sale. ➢ The major form of piracy on the net is violation of copyrights and trade marks. A part of this piracy had also been cyber squatting of domain names. ➢ Shall be punishable under section. 51, 63, 63B of Indian Copyright Act.
  • 73. • Where we stand – Twentieth in top 20 pirating countries – At 73%, behind China (92%), Vietnam (92%), Indonesia (88%) and Russia (87%) – Losses at $367 million • Benefits of piracy control – Reduction of piracy by 10% will • Promote innovation • Add $1.2 billion to GDP • Create 48,000 jobs • Add $92 million to tax revenues
  • 75. Threat vs. Opportunity • If misunderstood and misconfigured, misused Technology poses risk to our data, privacy, and safety • If understood , secured, efficient use of Technology will enhance communications, lifestyle, and delivery of services
  • 76. The Biggest Investment is “Investment in as much of yourself as you can, you are your own biggest by far. ✓ Are you wiser to day than yesterday, or last day , or last year , or five years ago ✓ Are you taking good care to be physically and mentally fit.
  • 78. 78 “Awareness about Cyber-crime threats is the best tool to avoid of being a victim”. Jayakumar PP 9847435193 jkambala@gmail.com https://www.facebook.com/jayakumar.purushan https://www.linkedin.com/pub/jayakumar-pp/65/59b/773 http://www.slideshare.net/jayakumarpurushan