SlideShare a Scribd company logo
1
DAV CMC/CAE/RD Conf.
 Everybody uses computers
 Crimes like forgery, extortion,
kidnapping , are all being assisted be
computers
 You are able to monitor all transactions
online
 All crimes performed or resorted to by abuse of
electronic media or otherwise, with the purpose
of influencing the functioning of computer or
computer system
 Computer crime is when
◦ Computer is a target
◦ Computer is a tool for the crime
◦ Computer is incidental to a crime
 Disgruntled employees
 Teenagers
 Political activist
 Professional Hackers
 Business Rival
 Ex wife or husband/BF or GF
 Gullible
 Greedy people
 Unskilled and Inexperienced
 Trusting People
 Unlucky people
 Anonymity
 Computer’s storage capacity
 Weakness in operating system
 Lack of Awareness from user
 Hacking
 Denial of service attack
 Virus dissemination
 Software Piracy
 Pornography
 IRC Crimes
 Credit Card Fraud
 NET Extortion
 Phishing
 Spoofing
 Cyber Stalking
 Cyber Defamation
 Threatening
 Salami Attack
Hacking: Illegal intrusion into a
computer system without the
permission of the computer
owner/user
An act by the criminal, who
floods the bandwidth of the
victim’s network or fills their e-
mail box with spam mail
depriving him of the services he
is entitled to access or provide
 Malicious software that
attaches itself to other
software.
 (Virus, Worms, Trojan Horse,
Time Bomb, Logic Bomb)
Theft of Software through the illegal
copying of genuine programs or the
counterfeiting and distribution of
products intended to pass for the
original
◦ Examples(Pirate Bay, Bootlegs, etc)
◦ End user copying, Downloads
Internet allows them to
◦ Instant access to other predators
worldwide;
◦ Open discussion with children
◦ Support from other pedophiles
◦ Disguise their identities
Internet Relay Chat (IRC) servers have chat rooms
in which people from anywhere the world can
come together and chat with each other
• Criminals use it for meeting coconspirators.
• Hackers use it for discussing their exploits /
sharing the techniques
• Pedophiles use chat rooms to allure small
children
• Cyber Stalking - In order to harass a woman her
telephone number is given to others as if she
wants to befriend males
If electronic transactions are not
secured the credit card numbers can
be stolen by the hackers who can
misuse this card by impersonating
the credit card owner
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
Copying the company’s
confidential data in order to
extort the company for a huge
amount
A technique of pulling out
confidential information from the
bank/financial accounts by deceptive
means
From: *****Bank [mailto:support@****Bank.com]
Sent: 08 June 2004 03:25
To: India
Subject: Official information from ***** Bank
Dear valued ***** Bank Customer!
For security purposes your account has been
randomly chosen for verification. To verify
your account information we are asking you to
provide us with all the data we are requesting.
Otherwise we will not be able to verify your identity
and access to your account will be denied. Please click
on the link below to get to the bank secure
page and verify your account details. Thank you.
https://infinity.*****bank.co.in/Verify.jsp
****** Bank Limited
Getting one Computer on the network to
pretend to have the identity of another
computer, usually one with special access
privileges, so as to obtain access to the
other computers on the network.
 The criminal follows the victim by sending
emails, entering the chat rooms as the person
being stalked frequently
 The Criminal sends emails containing
defamatory matters to all concerned off the
victim or post the defamatory matters on a
website..
 (disgruntled employee may do this against
boss,, ex-boys friend against girl,, divorced
husband against wife etc)
 The criminal sends threatening email or
comes in contact in the chat rooms with
victim
 (Anyone disgruntled may do this against
boss, friend or official)
 In such crime criminal makes insignificant
changes in such a manner that such changes
would go unnoticed.
 Criminal makes such program that deducts
small amount like Rs. 2.50 per month from the
account of all the customer of the Bank and
deposit the same in his account. In this case no
account holder will approach the bank for such
small amount but criminal gains huge amount.
 Sale and Purchase through the net
 Websites offer sales and shipment of
contraband drugs
 May use hidden messages to sell the
drugs
 This scam starts with a bulk mailing or bulk
faxing of a bunch of identical letters to
businessmen, professionals, and other
persons who tend to be of greater-than-
average wealth.
 This scam is often referred to as the 4-1-9
scam, ironically after section 4-1-9 of the
Nigerian Penal Code which relates to
fraudulent schemes
2.Cyber law and Crime.pptx
What is Cyber Crime:
Computer crime, or cybercrime, is crime that
involves a computer and a network.
The computer may have been used in the
commission of a crime, or it may be the target.
It may be defined as: "Offences that are
committed against individuals or groups of
individuals with a criminal motive to
intentionally harm the reputation of the
victim or cause physical or mental harm, or
loss, to the victim directly or indirectly,
using modern telecommunication networks
such as Internet (Chat rooms, emails,
notice boards and groups) and mobile
phones (SMS/MMS)".
Such crimes may even threaten a nation’s
security and financial health.
35
DAV CMC/CAE/RD Conf.
These types of crimes may be
 hacking : Fraud and Financial crimes and thefts,
cyber extortion
 copyright infringement
 child pornography and child bullying.
 harassment and crime against women
 other cross-border crimes, cyber terrorism,
 Activity crossing international borders and involving
the interests of at least one nation state is sometimes
referred to as cyberwarfare.
36
DAV CMC/CAE/RD Conf.
What does Law Says
Cyber crimes can involve criminal activities that are
traditional in nature, such as theft, fraud, forgery,
defamation and mischief, all of which are subject
to the Indian Penal Code. The abuse of computers
has also given birth to a gamut of new age crimes
that are addressed by the “Information
Technology Act, 2000”.
Section 67, 67A, 67B, 67C and 69 deals with child
abuse, ponography, MMS etc. and it is essential
that person heading child bullying and other related
issues is aware of these sections.
37
DAV CMC/CAE/RD Conf.
1. Safe Surfing Practices
a. Browser Security and Issues
b. Email Hacking and Security
c. Downloading Software's/Applications
2. Social Networking Sites -
a. Cyber Stalking & Harassment
b. Cyber Bullying
c. Security Features for popular Apps like Facebook,Twitter, Youtube.
3. Mobile Social Media- Securities
a. Smartphones and Securities
b. Popular Apps like Whatsapp, Viber, WeChat
c. Threats and Securities
4. E-commerce Securities
a. Online Shopping
b. Online Banking
c. Frauds and Securities
d. Debit/Credit Card threats and securities 38
DAV CMC/CAE/RD Conf.
Create Cyber Crime Reporting Cells in School
Child Helpline: Create a HOTLINE with a team Counselors/Cyber Experts
in your region. May team up with Mobile Service Provider to provide a Toll
Free Number where a student/victim can record his message on Voice Box
and this can be alerted to Expert Team to record a reply for the student.
Create a webpage with Complaint Form/Email Address which can be later
addressed by the team. To have one complaint BOX for Internet/Mobile
related complains
 Ensure Online Safety
Take help from NGOs, Local Cyber Police
◦
39
DAV CMC/CAE/RD Conf.
Cyber Congress: To give one day in a month on Cyber Safety/Cyber
Congress.
 Awareness Workshops for students and parents at regular intervals
 Make all subject teachers be a part of the Cyber Safety Drive.
 Train the teachers on Cyber Threats and Securities. ( Suggested: 6-8
Hrs of Training for teachers on the subject)
 Emphasis on POSTIVE USE OF INTERNET/MOBILE based on creative
projects for students
 Cyber Exhibitions should be orgnised by schools / regions
 Cyber Journal/Online or on Paper may be published by the region on
Regular Basis.
40
DAV CMC/CAE/RD Conf.
School or Group of Schools in a region to appoint one
dedicated CSO “Cyber Security Officer” under which a Cyber
Congress in each school will be functional.
Team of Cyber Congress will consist of :
a. One/Two parents from Parents Association.
b. One/Two ICT /Counselors to be a part of the team
c. 4-6 students from Senior/Middle Section
41
DAV CMC/CAE/RD Conf.
Function of Cyber Congress:
a. Spread and create awareness among students on
regular intervals about Cyber Safety - Do's and Dont's
b. Discuss issues and problems and to find solutions for
the same.
c. Create events with school staff on regular interval on
Cyber Safety theme like Essay Contest, Debate,
Exhibition, Poster Competition, Drama-Skit etc.
42
DAV CMC/CAE/RD Conf.
Principal, teachers and entire staff should be vigilant
at all times and should have proper policy. Each staff
memeber must know their exact role.
 Necessary safety measure should be taken in all
machines in computer lab by installing net safety
softwares, firewalls and blocking various cites.
 School Head boys, Head girls and other students
should take a lead role to find student in distress,
victim of cyber bully or else.
 Parents should be asked to maintain a cordial
relationship with children and be vigilant at all times
especially when child is using technology.
43
DAV CMC/CAE/RD Conf.
44
DAV CMC/CAE/RD Conf.

More Related Content

Similar to 2.Cyber law and Crime.pptx

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
CA.Kolluru Narayanarao
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
Muhammad Umar Farooq
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Sibesh Singh
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Deepak Shrivastava
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Rakesh Sahani
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
Aalbert Albert
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
praveen1792
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
Rajesh Satpathy, Regional College of Management (RCM), Bhubaneswar
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
srishtig993
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
Bolaji James Bankole CCSS,CEH,MCSA,MCSE,MCP,CCNA,
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
Accenture
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
SahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
SahilMishra81
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)
Abhinav Pathak
 

Similar to 2.Cyber law and Crime.pptx (20)

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)
 

Recently uploaded

New Features in Odoo 17 Sign - Odoo 17 Slides
New Features in Odoo 17 Sign - Odoo 17 SlidesNew Features in Odoo 17 Sign - Odoo 17 Slides
New Features in Odoo 17 Sign - Odoo 17 Slides
Celine George
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
JackieSparrow3
 
1-NLC-MATH7-Consolidation-Lesson1 2024.pptx
1-NLC-MATH7-Consolidation-Lesson1 2024.pptx1-NLC-MATH7-Consolidation-Lesson1 2024.pptx
1-NLC-MATH7-Consolidation-Lesson1 2024.pptx
AnneMarieJacildo
 
How to Create a New Article in Knowledge App in Odoo 17
How to Create a New Article in Knowledge App in Odoo 17How to Create a New Article in Knowledge App in Odoo 17
How to Create a New Article in Knowledge App in Odoo 17
Celine George
 
How to Empty a One2Many Field in Odoo 17
How to Empty a One2Many Field in Odoo 17How to Empty a One2Many Field in Odoo 17
How to Empty a One2Many Field in Odoo 17
Celine George
 
Webinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional SkillsWebinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional Skills
EduSkills OECD
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
KlettWorldLanguages
 
Kesadaran_Berbangsa_dan_Bernegara_Nasion.pptx
Kesadaran_Berbangsa_dan_Bernegara_Nasion.pptxKesadaran_Berbangsa_dan_Bernegara_Nasion.pptx
Kesadaran_Berbangsa_dan_Bernegara_Nasion.pptx
artenzmartenkai
 
C Interview Questions PDF By Scholarhat.pdf
C Interview Questions PDF By Scholarhat.pdfC Interview Questions PDF By Scholarhat.pdf
C Interview Questions PDF By Scholarhat.pdf
Scholarhat
 
matatag curriculum education for Kindergarten
matatag curriculum education for Kindergartenmatatag curriculum education for Kindergarten
matatag curriculum education for Kindergarten
SarahAlie1
 
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptxBRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
kambal1234567890
 
How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17
Celine George
 
CTD Punjab Police Past Papers MCQs PPSC PDF
CTD Punjab Police Past Papers MCQs PPSC PDFCTD Punjab Police Past Papers MCQs PPSC PDF
CTD Punjab Police Past Papers MCQs PPSC PDF
hammadmughal76316
 
How to Manage Access Rights & User Types in Odoo 17
How to Manage Access Rights & User Types in Odoo 17How to Manage Access Rights & User Types in Odoo 17
How to Manage Access Rights & User Types in Odoo 17
Celine George
 
(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening
MJDuyan
 
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Murugan Solaiyappan
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
Elizabeth Walsh
 
formative Evaluation By Dr.Kshirsagar R.V
formative Evaluation By Dr.Kshirsagar R.Vformative Evaluation By Dr.Kshirsagar R.V
formative Evaluation By Dr.Kshirsagar R.V
DrRavindrakshirsagar1
 
Year-to-Date Filter in Odoo 17 Dashboard
Year-to-Date Filter in Odoo 17 DashboardYear-to-Date Filter in Odoo 17 Dashboard
Year-to-Date Filter in Odoo 17 Dashboard
Celine George
 
How to Create & Publish a Blog in Odoo 17 Website
How to Create & Publish a Blog in Odoo 17 WebsiteHow to Create & Publish a Blog in Odoo 17 Website
How to Create & Publish a Blog in Odoo 17 Website
Celine George
 

Recently uploaded (20)

New Features in Odoo 17 Sign - Odoo 17 Slides
New Features in Odoo 17 Sign - Odoo 17 SlidesNew Features in Odoo 17 Sign - Odoo 17 Slides
New Features in Odoo 17 Sign - Odoo 17 Slides
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
 
1-NLC-MATH7-Consolidation-Lesson1 2024.pptx
1-NLC-MATH7-Consolidation-Lesson1 2024.pptx1-NLC-MATH7-Consolidation-Lesson1 2024.pptx
1-NLC-MATH7-Consolidation-Lesson1 2024.pptx
 
How to Create a New Article in Knowledge App in Odoo 17
How to Create a New Article in Knowledge App in Odoo 17How to Create a New Article in Knowledge App in Odoo 17
How to Create a New Article in Knowledge App in Odoo 17
 
How to Empty a One2Many Field in Odoo 17
How to Empty a One2Many Field in Odoo 17How to Empty a One2Many Field in Odoo 17
How to Empty a One2Many Field in Odoo 17
 
Webinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional SkillsWebinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional Skills
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
 
Kesadaran_Berbangsa_dan_Bernegara_Nasion.pptx
Kesadaran_Berbangsa_dan_Bernegara_Nasion.pptxKesadaran_Berbangsa_dan_Bernegara_Nasion.pptx
Kesadaran_Berbangsa_dan_Bernegara_Nasion.pptx
 
C Interview Questions PDF By Scholarhat.pdf
C Interview Questions PDF By Scholarhat.pdfC Interview Questions PDF By Scholarhat.pdf
C Interview Questions PDF By Scholarhat.pdf
 
matatag curriculum education for Kindergarten
matatag curriculum education for Kindergartenmatatag curriculum education for Kindergarten
matatag curriculum education for Kindergarten
 
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptxBRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
 
How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17
 
CTD Punjab Police Past Papers MCQs PPSC PDF
CTD Punjab Police Past Papers MCQs PPSC PDFCTD Punjab Police Past Papers MCQs PPSC PDF
CTD Punjab Police Past Papers MCQs PPSC PDF
 
How to Manage Access Rights & User Types in Odoo 17
How to Manage Access Rights & User Types in Odoo 17How to Manage Access Rights & User Types in Odoo 17
How to Manage Access Rights & User Types in Odoo 17
 
(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening
 
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
 
formative Evaluation By Dr.Kshirsagar R.V
formative Evaluation By Dr.Kshirsagar R.Vformative Evaluation By Dr.Kshirsagar R.V
formative Evaluation By Dr.Kshirsagar R.V
 
Year-to-Date Filter in Odoo 17 Dashboard
Year-to-Date Filter in Odoo 17 DashboardYear-to-Date Filter in Odoo 17 Dashboard
Year-to-Date Filter in Odoo 17 Dashboard
 
How to Create & Publish a Blog in Odoo 17 Website
How to Create & Publish a Blog in Odoo 17 WebsiteHow to Create & Publish a Blog in Odoo 17 Website
How to Create & Publish a Blog in Odoo 17 Website
 

2.Cyber law and Crime.pptx

  • 2.  Everybody uses computers  Crimes like forgery, extortion, kidnapping , are all being assisted be computers  You are able to monitor all transactions online
  • 3.  All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system  Computer crime is when ◦ Computer is a target ◦ Computer is a tool for the crime ◦ Computer is incidental to a crime
  • 4.  Disgruntled employees  Teenagers  Political activist  Professional Hackers  Business Rival  Ex wife or husband/BF or GF
  • 5.  Gullible  Greedy people  Unskilled and Inexperienced  Trusting People  Unlucky people
  • 6.  Anonymity  Computer’s storage capacity  Weakness in operating system  Lack of Awareness from user
  • 7.  Hacking  Denial of service attack  Virus dissemination  Software Piracy  Pornography  IRC Crimes  Credit Card Fraud  NET Extortion  Phishing  Spoofing  Cyber Stalking  Cyber Defamation  Threatening  Salami Attack
  • 8. Hacking: Illegal intrusion into a computer system without the permission of the computer owner/user
  • 9. An act by the criminal, who floods the bandwidth of the victim’s network or fills their e- mail box with spam mail depriving him of the services he is entitled to access or provide
  • 10.  Malicious software that attaches itself to other software.  (Virus, Worms, Trojan Horse, Time Bomb, Logic Bomb)
  • 11. Theft of Software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original ◦ Examples(Pirate Bay, Bootlegs, etc) ◦ End user copying, Downloads
  • 12. Internet allows them to ◦ Instant access to other predators worldwide; ◦ Open discussion with children ◦ Support from other pedophiles ◦ Disguise their identities
  • 13. Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other • Criminals use it for meeting coconspirators. • Hackers use it for discussing their exploits / sharing the techniques • Pedophiles use chat rooms to allure small children • Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males
  • 14. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
  • 24. Copying the company’s confidential data in order to extort the company for a huge amount
  • 25. A technique of pulling out confidential information from the bank/financial accounts by deceptive means
  • 26. From: *****Bank [mailto:support@****Bank.com] Sent: 08 June 2004 03:25 To: India Subject: Official information from ***** Bank Dear valued ***** Bank Customer! For security purposes your account has been randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify your account details. Thank you. https://infinity.*****bank.co.in/Verify.jsp ****** Bank Limited
  • 27. Getting one Computer on the network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network.
  • 28.  The criminal follows the victim by sending emails, entering the chat rooms as the person being stalked frequently
  • 29.  The Criminal sends emails containing defamatory matters to all concerned off the victim or post the defamatory matters on a website..  (disgruntled employee may do this against boss,, ex-boys friend against girl,, divorced husband against wife etc)
  • 30.  The criminal sends threatening email or comes in contact in the chat rooms with victim  (Anyone disgruntled may do this against boss, friend or official)
  • 31.  In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed.  Criminal makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
  • 32.  Sale and Purchase through the net  Websites offer sales and shipment of contraband drugs  May use hidden messages to sell the drugs
  • 33.  This scam starts with a bulk mailing or bulk faxing of a bunch of identical letters to businessmen, professionals, and other persons who tend to be of greater-than- average wealth.  This scam is often referred to as the 4-1-9 scam, ironically after section 4-1-9 of the Nigerian Penal Code which relates to fraudulent schemes
  • 35. What is Cyber Crime: Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. It may be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may even threaten a nation’s security and financial health. 35 DAV CMC/CAE/RD Conf.
  • 36. These types of crimes may be  hacking : Fraud and Financial crimes and thefts, cyber extortion  copyright infringement  child pornography and child bullying.  harassment and crime against women  other cross-border crimes, cyber terrorism,  Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyberwarfare. 36 DAV CMC/CAE/RD Conf.
  • 37. What does Law Says Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the “Information Technology Act, 2000”. Section 67, 67A, 67B, 67C and 69 deals with child abuse, ponography, MMS etc. and it is essential that person heading child bullying and other related issues is aware of these sections. 37 DAV CMC/CAE/RD Conf.
  • 38. 1. Safe Surfing Practices a. Browser Security and Issues b. Email Hacking and Security c. Downloading Software's/Applications 2. Social Networking Sites - a. Cyber Stalking & Harassment b. Cyber Bullying c. Security Features for popular Apps like Facebook,Twitter, Youtube. 3. Mobile Social Media- Securities a. Smartphones and Securities b. Popular Apps like Whatsapp, Viber, WeChat c. Threats and Securities 4. E-commerce Securities a. Online Shopping b. Online Banking c. Frauds and Securities d. Debit/Credit Card threats and securities 38 DAV CMC/CAE/RD Conf.
  • 39. Create Cyber Crime Reporting Cells in School Child Helpline: Create a HOTLINE with a team Counselors/Cyber Experts in your region. May team up with Mobile Service Provider to provide a Toll Free Number where a student/victim can record his message on Voice Box and this can be alerted to Expert Team to record a reply for the student. Create a webpage with Complaint Form/Email Address which can be later addressed by the team. To have one complaint BOX for Internet/Mobile related complains  Ensure Online Safety Take help from NGOs, Local Cyber Police ◦ 39 DAV CMC/CAE/RD Conf.
  • 40. Cyber Congress: To give one day in a month on Cyber Safety/Cyber Congress.  Awareness Workshops for students and parents at regular intervals  Make all subject teachers be a part of the Cyber Safety Drive.  Train the teachers on Cyber Threats and Securities. ( Suggested: 6-8 Hrs of Training for teachers on the subject)  Emphasis on POSTIVE USE OF INTERNET/MOBILE based on creative projects for students  Cyber Exhibitions should be orgnised by schools / regions  Cyber Journal/Online or on Paper may be published by the region on Regular Basis. 40 DAV CMC/CAE/RD Conf.
  • 41. School or Group of Schools in a region to appoint one dedicated CSO “Cyber Security Officer” under which a Cyber Congress in each school will be functional. Team of Cyber Congress will consist of : a. One/Two parents from Parents Association. b. One/Two ICT /Counselors to be a part of the team c. 4-6 students from Senior/Middle Section 41 DAV CMC/CAE/RD Conf.
  • 42. Function of Cyber Congress: a. Spread and create awareness among students on regular intervals about Cyber Safety - Do's and Dont's b. Discuss issues and problems and to find solutions for the same. c. Create events with school staff on regular interval on Cyber Safety theme like Essay Contest, Debate, Exhibition, Poster Competition, Drama-Skit etc. 42 DAV CMC/CAE/RD Conf.
  • 43. Principal, teachers and entire staff should be vigilant at all times and should have proper policy. Each staff memeber must know their exact role.  Necessary safety measure should be taken in all machines in computer lab by installing net safety softwares, firewalls and blocking various cites.  School Head boys, Head girls and other students should take a lead role to find student in distress, victim of cyber bully or else.  Parents should be asked to maintain a cordial relationship with children and be vigilant at all times especially when child is using technology. 43 DAV CMC/CAE/RD Conf.