WELCOME TO MY
PRESENTATION
PRESENTED BY KARUNA
CHOUDHARY
CONTENT
 INTRODUCTIONOF CYBER CRIMES
 HISTORYOF CYBERCRIME
 CATEGORIESOF CYBERCRIME
 TYPES OF CYBERCRIME
 ADVANTAGESOF CYBER SECURITY
 DISADVANTAGES OF CYBERSRECURITY
 CASESARE THEREIN INDIA
 CASESARE REGISTERED
 PREVENTATION
 CONCLUSION
INTRODUCTION ON CYBER SECURITY
• A cybercrime is a crime that involves a computer or a
computer network. The computer may have been used in
committing the crime, or it may be the target. Cybercrime
may harm someone's security or finances.
HISTORY OF CYBER CRIMES
 THEFIRSTRECORDEDCYBERCRIMETOOKPLACEIN THEYEAR1820
 IN 1820, JOSEPH-MARIEJACQUARD, A TEXTILEMANUFACTURERIN FRANCE, PRODUCEDTHE LOOM. THISDEVICE
ALLOWEDTHEREPETITIONOF A SERIESOF STEPSIN THE WEAVINGOF SPECIAL FABRICS. THISRESULTEDIN A FEAR
AMONGSTJACQUARD’S-EMPOLOYEESTHATTHEIRTRADITIONALEMPLOYEMENTANDLIVELIHOODWEREBEING
THREATENED. THEYCOMMITTEDACTSOF SABOTAGETO DISCOURAGEJACQUARDFROMFURTHERUSE OF THE
NEWTECHNOLOGY. THISIS FIRSTRECORDEDCYBERCRIME!
 THATIS NOT SURPRISINGCONSIDERINGTHE FACTTHATTHEABACUS, WHICHIS THOUGHTTOBE THE EARLIEST
FROMOF A COMPUTER, HASBEENAROUNDSINCE3500B.c.
 IN INDIA, JAPANANDCHINA, THEERAOF MODERNCOMPUTER, HOWEVER, BEGANWITHTHEANALYTIOCAL
ENGINE OF CHARLESBABBAGE.
CATEGORIES OF CYBER CRIMES
WE CAN CATEGORIZE CYBERCRIME IN TWOWAYS:-
THE COMPUTER AS A TARGET:-USING A COMPUTE R T0O ATTACKS OTHER
COMPUTER, E.G. HACKING , VIRUS/WORMS ATTACKS , DOS ATTACK ETC.
THE COMPUTER AS A WEAPON:- USING A COMPUTER TO COMMITREAL
WORLDCRIME E.G. CYBER TERRORISM, CREDITCARDFRAUDAND
PORNOGRAPHY ETC.
CATEGORIES OF CYBER CRIME
CYBER CRIMES CAN BE BASICALLY DIVIDED INTO 3 MAJOR
CATEGORIES:-
CYBER CRIMES AGAINST PERSONS.
CYBER CRIMES AGAINST PROPERTY.
CYBER CRIMES AGAINST GOVERNMENT.
FIRST CATEGORY
CYBER CRIMES AGAINST PERSONS
CYBER HARASSMENT IS A DISTINCT CYBER CRIME. VARIOUS KINDS OF
HARRAAMENT CAN DO OCCUR IN CYBER SPACE, OR THROUGH THE
USE OF CYBER SPACE. HARRASSMENT CAN BE
SEXUAL,RACIAL,RELIGIOUS,OR OTHER.
SECOND CATEGORY
CYBER CRIMES AGAINST PROPERTY
THIS CRIME INCUDE COMPUTER VANDALISM.
(DESTRUCTION OF OTHER’ PROPERTY),TRANSMISSIONOF HARMFUL
PROGRAMES , UNAUTHIORIZEDTRESPASSING THROUGHCYBERSPACE,
UNAUTHORIZEDPOSESSIONOF COMPUTERINFORMATION
THIRD CATEGORY
CYBER CRIME AGAINST GOVERNMENT
CYBER TERRORISM IS ONE DISTINCT KIND OF C RIME IN THIS
CATEGORY
THE GROWTH OF INTERNET HAS SHOWN THAT THE MEDIUM OF
CYBERSPACE IS BEING USED BY INDIVIDUALS AND GROUPS TO
THREATEN THE IMTERNATIONAL GOAVERMENTS AS ALSO TO
TERRORIZE THE CITIZENS OF A COUNTRY.
•Critical infrastructure security.
•Application security.
•Network security.
•Cloud security.
•Internetof Things (IoT) security.
TYPES OF CYBER crime
Phishing Scams
Website Spoofing
Ransomware
Malware
IOT Hacking
internet fraud
Cyber Bullying
Software Piracy
Social Media Frauds
Online Drug Trafficking
Electronic Money Laundering
Cyber Extortion
Intellectual-property Infringements
IMPACTS OF CYBER CRIME
The ill effects of cybercrimes often lead to extreme financial ruin and
reputation loss to both businesses and individuals. Moreover, the
repercussions of cybercrimes can affect society in numerous ways.
Cybercrime can take numerous forms, be it online scams for petty
thefts or serious threats like terrorism.
IMPACTS OF CYBER CRIME ON INDIVIDUALS
Cyber-attacks can lead to a loss of sensitive data, including personal
information, passwords, and credit card numbers. This gives cybercriminals
the ability to sell their details on the dark web, ransom, or harass their
customers. Hackers also have access to personal information for
impersonation or identity robbery.
IMPACTS OF CYBER CRIME IN SOCIETY
The overall monetary impact of cyber-crime on society and
government is significant. Every year, millions of pounds are lost to
online criminal activity worldwide. This is money that could be better
spent elsewhere in other areas —such as healthcare, education and
infrastructure.
IMAPACTS OF CYBER CRIME IN THE ECONOMY
Cyber crime's most significant impacts include financial and
economic hardship, loss of critical intellectual property and sensitive
data, and loss of revenue from diminished international trade.
IMAPCTS OF CYBER CRTIME ON THE GOVERMENT
For national security concerns, the likely cybercrime threats deal
on espionage activity, disruption, sabotage, politically motivated
attacks and those which involve terrorismactivities.
CYBER LAWS
LAWGOVERNING CYBER SPACE
CYBER LAW ENCOMPASSES LAWS RELATING TO :-
------ CYBER CRIMES
ELECTONICAND DIGITAL SIGNATURES
------ INTELLECTUIAL PROPERTY
------ DATA PROTECTION AND PRIVACY
HOW MANY CYBER CRIMES CASES ARE THERE IN INDIA
CERT-In (Indian Computer Emergency Response Team) has
reported that a total number of 14,02,809
and 6,74,021 cybersecurity incidents are observed during the
year 2021 & 2022 (up to June) respectively.
HOW MANY CYBER CRIME CASES ARE REGISTERED
IN INDIA
India saw a significant jump in cyber crimes reported in 2021 from
the previous year. That year, over 52 thousand cyber crime incidents
were registered. Karnataka and Uttar Pradesh accounted for the
highest share during the measured time period
WAYS TO PROTECT OURSELF FROM CYBER CRIME
 Use a full-service internet security suite
 Use strong passwords
 Keep your software updated
 Manage your social media settings
 Strengthen your home network
 Talk to your children about the internet
 Keep up to date on major security breaches
 Take measures to help protect yourself against identity theft
 Know that identity theft can happen anywhere
Keep an eye on the kids
 Know what to do if you become a victim
 Train your staff
 Keep your software and systems fully up to date
 Ensure Endpoint Protection
 Install a Firewall
 Backup your data
 Control access to your systems
 Wi-Fi Security
 Update your software
CONCLUSION
WITHINTHE LAWENFORCEMENT AGENCIES, A SET OF RULES MUSTBE
DEVELOPEDTO ADDRESS THE VARIOUS CATEGORIES OF COMPUTERCRIME.
AS SUCH, INVESTIGATORS WILL KNOWWHAT ANDWHICHMATERIALS TO
SEARCHANDSEIZE, THE ELECTRONIC EVIDENCE TO RECOVER, AND THE
CHAINOF CUSTODY TO MAINTAIN.
CYBER CRIME

CYBER CRIME

  • 1.
  • 2.
    CONTENT  INTRODUCTIONOF CYBERCRIMES  HISTORYOF CYBERCRIME  CATEGORIESOF CYBERCRIME  TYPES OF CYBERCRIME  ADVANTAGESOF CYBER SECURITY  DISADVANTAGES OF CYBERSRECURITY  CASESARE THEREIN INDIA  CASESARE REGISTERED  PREVENTATION  CONCLUSION
  • 3.
    INTRODUCTION ON CYBERSECURITY • A cybercrime is a crime that involves a computer or a computer network. The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone's security or finances.
  • 4.
    HISTORY OF CYBERCRIMES  THEFIRSTRECORDEDCYBERCRIMETOOKPLACEIN THEYEAR1820  IN 1820, JOSEPH-MARIEJACQUARD, A TEXTILEMANUFACTURERIN FRANCE, PRODUCEDTHE LOOM. THISDEVICE ALLOWEDTHEREPETITIONOF A SERIESOF STEPSIN THE WEAVINGOF SPECIAL FABRICS. THISRESULTEDIN A FEAR AMONGSTJACQUARD’S-EMPOLOYEESTHATTHEIRTRADITIONALEMPLOYEMENTANDLIVELIHOODWEREBEING THREATENED. THEYCOMMITTEDACTSOF SABOTAGETO DISCOURAGEJACQUARDFROMFURTHERUSE OF THE NEWTECHNOLOGY. THISIS FIRSTRECORDEDCYBERCRIME!  THATIS NOT SURPRISINGCONSIDERINGTHE FACTTHATTHEABACUS, WHICHIS THOUGHTTOBE THE EARLIEST FROMOF A COMPUTER, HASBEENAROUNDSINCE3500B.c.  IN INDIA, JAPANANDCHINA, THEERAOF MODERNCOMPUTER, HOWEVER, BEGANWITHTHEANALYTIOCAL ENGINE OF CHARLESBABBAGE.
  • 5.
    CATEGORIES OF CYBERCRIMES WE CAN CATEGORIZE CYBERCRIME IN TWOWAYS:- THE COMPUTER AS A TARGET:-USING A COMPUTE R T0O ATTACKS OTHER COMPUTER, E.G. HACKING , VIRUS/WORMS ATTACKS , DOS ATTACK ETC. THE COMPUTER AS A WEAPON:- USING A COMPUTER TO COMMITREAL WORLDCRIME E.G. CYBER TERRORISM, CREDITCARDFRAUDAND PORNOGRAPHY ETC.
  • 6.
    CATEGORIES OF CYBERCRIME CYBER CRIMES CAN BE BASICALLY DIVIDED INTO 3 MAJOR CATEGORIES:- CYBER CRIMES AGAINST PERSONS. CYBER CRIMES AGAINST PROPERTY. CYBER CRIMES AGAINST GOVERNMENT.
  • 7.
    FIRST CATEGORY CYBER CRIMESAGAINST PERSONS CYBER HARASSMENT IS A DISTINCT CYBER CRIME. VARIOUS KINDS OF HARRAAMENT CAN DO OCCUR IN CYBER SPACE, OR THROUGH THE USE OF CYBER SPACE. HARRASSMENT CAN BE SEXUAL,RACIAL,RELIGIOUS,OR OTHER.
  • 8.
    SECOND CATEGORY CYBER CRIMESAGAINST PROPERTY THIS CRIME INCUDE COMPUTER VANDALISM. (DESTRUCTION OF OTHER’ PROPERTY),TRANSMISSIONOF HARMFUL PROGRAMES , UNAUTHIORIZEDTRESPASSING THROUGHCYBERSPACE, UNAUTHORIZEDPOSESSIONOF COMPUTERINFORMATION
  • 9.
    THIRD CATEGORY CYBER CRIMEAGAINST GOVERNMENT CYBER TERRORISM IS ONE DISTINCT KIND OF C RIME IN THIS CATEGORY THE GROWTH OF INTERNET HAS SHOWN THAT THE MEDIUM OF CYBERSPACE IS BEING USED BY INDIVIDUALS AND GROUPS TO THREATEN THE IMTERNATIONAL GOAVERMENTS AS ALSO TO TERRORIZE THE CITIZENS OF A COUNTRY.
  • 10.
    •Critical infrastructure security. •Applicationsecurity. •Network security. •Cloud security. •Internetof Things (IoT) security. TYPES OF CYBER crime Phishing Scams Website Spoofing Ransomware Malware IOT Hacking internet fraud Cyber Bullying Software Piracy Social Media Frauds Online Drug Trafficking Electronic Money Laundering Cyber Extortion Intellectual-property Infringements
  • 11.
    IMPACTS OF CYBERCRIME The ill effects of cybercrimes often lead to extreme financial ruin and reputation loss to both businesses and individuals. Moreover, the repercussions of cybercrimes can affect society in numerous ways. Cybercrime can take numerous forms, be it online scams for petty thefts or serious threats like terrorism.
  • 12.
    IMPACTS OF CYBERCRIME ON INDIVIDUALS Cyber-attacks can lead to a loss of sensitive data, including personal information, passwords, and credit card numbers. This gives cybercriminals the ability to sell their details on the dark web, ransom, or harass their customers. Hackers also have access to personal information for impersonation or identity robbery.
  • 14.
    IMPACTS OF CYBERCRIME IN SOCIETY The overall monetary impact of cyber-crime on society and government is significant. Every year, millions of pounds are lost to online criminal activity worldwide. This is money that could be better spent elsewhere in other areas —such as healthcare, education and infrastructure.
  • 15.
    IMAPACTS OF CYBERCRIME IN THE ECONOMY Cyber crime's most significant impacts include financial and economic hardship, loss of critical intellectual property and sensitive data, and loss of revenue from diminished international trade.
  • 16.
    IMAPCTS OF CYBERCRTIME ON THE GOVERMENT For national security concerns, the likely cybercrime threats deal on espionage activity, disruption, sabotage, politically motivated attacks and those which involve terrorismactivities.
  • 17.
    CYBER LAWS LAWGOVERNING CYBERSPACE CYBER LAW ENCOMPASSES LAWS RELATING TO :- ------ CYBER CRIMES ELECTONICAND DIGITAL SIGNATURES ------ INTELLECTUIAL PROPERTY ------ DATA PROTECTION AND PRIVACY
  • 18.
    HOW MANY CYBERCRIMES CASES ARE THERE IN INDIA CERT-In (Indian Computer Emergency Response Team) has reported that a total number of 14,02,809 and 6,74,021 cybersecurity incidents are observed during the year 2021 & 2022 (up to June) respectively.
  • 20.
    HOW MANY CYBERCRIME CASES ARE REGISTERED IN INDIA India saw a significant jump in cyber crimes reported in 2021 from the previous year. That year, over 52 thousand cyber crime incidents were registered. Karnataka and Uttar Pradesh accounted for the highest share during the measured time period
  • 22.
    WAYS TO PROTECTOURSELF FROM CYBER CRIME  Use a full-service internet security suite  Use strong passwords  Keep your software updated  Manage your social media settings  Strengthen your home network  Talk to your children about the internet  Keep up to date on major security breaches  Take measures to help protect yourself against identity theft  Know that identity theft can happen anywhere Keep an eye on the kids  Know what to do if you become a victim  Train your staff  Keep your software and systems fully up to date  Ensure Endpoint Protection  Install a Firewall  Backup your data  Control access to your systems  Wi-Fi Security  Update your software
  • 23.
    CONCLUSION WITHINTHE LAWENFORCEMENT AGENCIES,A SET OF RULES MUSTBE DEVELOPEDTO ADDRESS THE VARIOUS CATEGORIES OF COMPUTERCRIME. AS SUCH, INVESTIGATORS WILL KNOWWHAT ANDWHICHMATERIALS TO SEARCHANDSEIZE, THE ELECTRONIC EVIDENCE TO RECOVER, AND THE CHAINOF CUSTODY TO MAINTAIN.