SlideShare a Scribd company logo
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
PromotingNetSafety
LearntolivesafeinthechangingCyberWorld
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
• Introduction
• History of cyber crime
• Cyber Law : India
• Types of cyber crime
• Cyber criminals
• Prevention
• Conclusion
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
CYBERCRIME
• Cybercrime is any illegal act committed using a
computer network (especially the Internet).
• Cybercrime is a subset of computer crime.
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
HISTORY
The first recorded cyber crime took place in the year 1820!
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
OFFICIAL WEBSITE OF MAHARASTRA
GOVERNMENT HACKED
MUMBAI, 20 September 2007 — IT experts
were trying yesterday to restore the official
website of the government of Maharashtra,
which was hacked in the early hours of
Tuesday.
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
Cyber Criminals
• Kids (age group 9-16 etc.)
• Organized hacktivists
• Disgruntled employees
• Professional hackers (corporate espionage)
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
 Consider:
 Hardware and software keeps getting cheaper
 Combine the Internet and a global scope, the the
potential for attacks is limitless
 Security will always be breached
 Even when laws are passed to increase technological
safeguards, new technology will always outstrip
legislation
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
TYPES OF CYBER CRIME
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
By 2040
more crime
will be
committed
by
machines
than
by humans
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019
Think twice
before you
click
IN SERVICE TEACHER’S TRAINING
PROGRAM 2018-2019

More Related Content

What's hot

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
pronab Kurmi
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Santosh Khadsare
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
Benjamin Ang
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet Infrastructure
Francis Amaning
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
Benjamin Ang
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Benjamin Ang
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
GovCloud Network
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
Vidushi Singh
 
Cyber Security For Businesses
Cyber Security For BusinessesCyber Security For Businesses
Cyber Security For Businesses
Parliamentary Yearbook
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyond
Benjamin Ang
 

What's hot (11)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet Infrastructure
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Cyber Security For Businesses
Cyber Security For BusinessesCyber Security For Businesses
Cyber Security For Businesses
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyond
 

Similar to Cyber crime

CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
chiragsahoo5
 
NOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENT
NOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENTNOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENT
NOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENT
Bobby Murugesan
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Benjamin Ang
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
Ethical Sector
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
JASJIT SINGH
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIACYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
IRJET Journal
 
A Career in Cybersecurity – an Australian perspective; outlook, opportunities...
A Career in Cybersecurity – an Australian perspective; outlook, opportunities...A Career in Cybersecurity – an Australian perspective; outlook, opportunities...
A Career in Cybersecurity – an Australian perspective; outlook, opportunities...
Ashwani Ram
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Surakshya Poudel
 
Establishment of Threat Intel into Incident Response
Establishment of Threat Intel into Incident ResponseEstablishment of Threat Intel into Incident Response
Establishment of Threat Intel into Incident Response
APNIC
 
Mich_Cyber_Initiative_2015
Mich_Cyber_Initiative_2015Mich_Cyber_Initiative_2015
Mich_Cyber_Initiative_2015
Rob Blackwell
 
cybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crimecybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crime
sujansujan1113
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Vivek Gupta
 

Similar to Cyber crime (13)

CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
NOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENT
NOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENTNOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENT
NOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENT
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIACYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
 
A Career in Cybersecurity – an Australian perspective; outlook, opportunities...
A Career in Cybersecurity – an Australian perspective; outlook, opportunities...A Career in Cybersecurity – an Australian perspective; outlook, opportunities...
A Career in Cybersecurity – an Australian perspective; outlook, opportunities...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Establishment of Threat Intel into Incident Response
Establishment of Threat Intel into Incident ResponseEstablishment of Threat Intel into Incident Response
Establishment of Threat Intel into Incident Response
 
Mich_Cyber_Initiative_2015
Mich_Cyber_Initiative_2015Mich_Cyber_Initiative_2015
Mich_Cyber_Initiative_2015
 
cybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crimecybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

More from Rekha Shukla

Women in science
Women in scienceWomen in science
Women in science
Rekha Shukla
 
Nation building
Nation buildingNation building
Nation building
Rekha Shukla
 
Gk quiz
Gk quizGk quiz
Gk quiz
Rekha Shukla
 
Critical and Creative thinking
Critical and Creative thinkingCritical and Creative thinking
Critical and Creative thinking
Rekha Shukla
 
The Heritage Arc
The Heritage ArcThe Heritage Arc
The Heritage Arc
Rekha Shukla
 
Peace education in schools
Peace education in schoolsPeace education in schools
Peace education in schools
Rekha Shukla
 
Brave Children
Brave ChildrenBrave Children
Brave Children
Rekha Shukla
 
First Love Yourself
First Love YourselfFirst Love Yourself
First Love Yourself
Rekha Shukla
 
Bullying
BullyingBullying
Bullying
Rekha Shukla
 
Ncc and nation building
Ncc and nation buildingNcc and nation building
Ncc and nation building
Rekha Shukla
 
Reverence For Life
Reverence For LifeReverence For Life
Reverence For Life
Rekha Shukla
 
Lucknow food
Lucknow foodLucknow food
Lucknow food
Rekha Shukla
 
Gk quiz
Gk quizGk quiz
Gk quiz
Rekha Shukla
 
Happy and healthy teacher
Happy and healthy teacherHappy and healthy teacher
Happy and healthy teacher
Rekha Shukla
 
Famous Personalities of lucknow
Famous Personalities  of lucknowFamous Personalities  of lucknow
Famous Personalities of lucknow
Rekha Shukla
 
Quiz on renowned women
Quiz on renowned womenQuiz on renowned women
Quiz on renowned women
Rekha Shukla
 

More from Rekha Shukla (16)

Women in science
Women in scienceWomen in science
Women in science
 
Nation building
Nation buildingNation building
Nation building
 
Gk quiz
Gk quizGk quiz
Gk quiz
 
Critical and Creative thinking
Critical and Creative thinkingCritical and Creative thinking
Critical and Creative thinking
 
The Heritage Arc
The Heritage ArcThe Heritage Arc
The Heritage Arc
 
Peace education in schools
Peace education in schoolsPeace education in schools
Peace education in schools
 
Brave Children
Brave ChildrenBrave Children
Brave Children
 
First Love Yourself
First Love YourselfFirst Love Yourself
First Love Yourself
 
Bullying
BullyingBullying
Bullying
 
Ncc and nation building
Ncc and nation buildingNcc and nation building
Ncc and nation building
 
Reverence For Life
Reverence For LifeReverence For Life
Reverence For Life
 
Lucknow food
Lucknow foodLucknow food
Lucknow food
 
Gk quiz
Gk quizGk quiz
Gk quiz
 
Happy and healthy teacher
Happy and healthy teacherHappy and healthy teacher
Happy and healthy teacher
 
Famous Personalities of lucknow
Famous Personalities  of lucknowFamous Personalities  of lucknow
Famous Personalities of lucknow
 
Quiz on renowned women
Quiz on renowned womenQuiz on renowned women
Quiz on renowned women
 

Recently uploaded

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 

Recently uploaded (12)

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 

Cyber crime