SlideShare a Scribd company logo
CYBER CRIME
Cyber crime is a genetic term refers to all criminal activities
done using the medium of computers. The internet , cyber space
and the worldwide web.
or
Cyber crime is any illegal behavior directed by means of
electronic operation that targets the security of computer system
and the data processed by them.

CYBER CRIME LAWS
The Indian Law has not given any definition to the term ‟CYBER
CRIME‟. In fact , the indian
penal code does not use a term „CYBER CRIME‟ at any point even
after its amendment by the information technology
(amendment)ACT 2008, the indian cyber crime.
But “Cyber Security ” is defined under section (2) means protection
information, computer resource, communication device and
information stored there in from unauthorized
access, use, disclosure, disruption, modification or destruction.

TYPES OF CYBER CRIME
•Denial of service attack
•IRC crime
•Credit card fraud
•Phishing
•Cyber stalking
•Cyber defamation
•Threatening
•Salami attack
•Hacking

•Net extortion
•Piracy
•Financial
•Schools & home
•Data thief
•E-mail spoofing
•Identity thief
•Spreading virus and worms
HACKING
The act of gaining unauthorized access to a computer
system, programs, data or network resources and in some cases making
unauthorized use of this access. Hacking is also the act by which other
forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed. Hacking in
simple terms means illegal intrusion into a computer system without the
permission of the computer owner/user. (The term “hacker” originally meant
a very gifted programmer. In recent years though, with easier access to
multiple systems, it has negative implications.)

Law & Punishment: Under
Information Technology (Amendment) Act, 2008, Section 43(a) read with
section 66 is applicable and Section 379 & 406 of Indian Penal Code, 1860
also are applicable . If crime is proved under IT Act, accused shall be
punished for imprisonment, which may extend to years
or with fine, which may extend to five lakh rupees or both.
PIRACY
T h e s o f t wa r e i n d u s t r y p l a y s a l e a d i n g r o l e
i n c r e a t i n g p r o d u c t s t h a t h a v e v a s t l y
i mp r o v e d o u r l i v e s a n d w o r k e n v i r o n me n t .
Un f o r t u n a t e l y , s o f t wa r e t h e f t , o r p i r a c y , h a s
h a d a n e g a t i v e i mp a c t o n t h e g l o b a l
ma r k e t p l a c e a n d t h e a b i l i t y t o c r e a t e n e w
p r o d u c t s . Co p y i n g i n t h e
w o r k p l a c e , c o u n t e r f e i t i n g a n d v a r i o u s f o r ms
o f i l l e g a l d i s t r i b u t i o n i n c o a s t .
F u r t h e r mo r e , t h e u n a u t h o r i z e d e l e c t r o n i c
d i s t r i b u t i o n a n d s a l e o f c o p y r i g h t e d d a t a
o r s o f t wa r e i n h u g e p r i c e s , wo r k o v e r t h e
I n t e r n e t t h r e a t e n s t o ma k e t h e s e p r o b l e ms
s e e m a l mo s t q u a i n t b y c o mp a r i s o n . C r i me C a n
b e s t o o p e d i n v a r i o u s wa y s s u c h a s e n d u s e r
Inosuch icrime criminal d i s k insignificant changes in such a manner that
c p y n g , h a r d makes
such changes , C o u n t e r f e i t i n g , I l l e g a l d o w n l o a d s
l o a d i n g
would go unnoticed. e r n e t makes .such program that deducts small
f r o m t h e i n t Criminal e t c
amount like 2.50 per month from the account of all the customer of the
Bank and deposit the same in his account. In this case no account holder
will approach the bank for such small amount but criminal gains huge
amount

SALAMI ATTACK
E-MAIL SPOOFING
E-mail spoofing is sending an e-mail to another person in such a way
that it appears that the e-mail was sent by someone else. Spoofing is
the act of electronically disguising one computer as another for gaining
as the password system. It is becoming so common that you can no
longer take for granted that the e-mail you are receiving is truly from
the person identified as the sender.
Email spoofing is a technique used by hackers to fraudulently send email
messages in which the sender address and other parts of the email
header are altered to appear as though the email originated from a
source other than its actual source. There is another name of e-mail
spoofingCYBER DEFAMATION

The Criminal sends emails containing defamatory matters to
all concerned of the victim or post the defamatory matters
on a website. (disgruntled employee may do this against
boss, ex- divorced husband against wife etc)
SPREADING VIRUS OR
c a s e s , v i r u WORMS d o a n y a m o u n t
s e s c a n

I n mo s t
o f
d a ma g e , t h e c r e a t o r i n t e n d s t h e
t o d o . Th e y c a n s e n d y o u r d a t a t o a t h i r d
p a r t y a n d t h e n d e l e t e y o u r d a t a f r o m
y o u r c o m p u t e r . T h e y c a n a l s o r u i n /m e s s u p
y o u r s y s t e m a n d r e n d e r i t u n u s a b l e
w i t h o u t a r e -i n s t a l l a t i o n o f t h e o p e r a t i n g
s y s t e m. U s u a l l y t h e v i r u s w i l l f i l e s o n y o u r
s y s t e m a n d t h e n wi l l i n s t a l l c h a n g e y o u r
s y s t e m s o t h a t v i r u s p r o g r a m i s r u n e v e r y
t i me y o u s t a r t y o u r s y s t e m. E x (v i r u s , w o r m s , T r o j a n H o r s e , T i m e b o m b ,L o g i c
B o mb , R a b b i t a n d B a c t e r i u m a r e t h e ma l i c i o u s
While the Internet e s be a unique educational and recreational resource for students, it is
s o f t w a r can )
important that they are educated about how to safely and responsibly use this powerful tool.
The issue related to the presence of the young on the Internet is the potential misuse of this
tool. Whether the consequences are intentional or unintentional, the Internet can open a
dangerous window of accessibility for the young who are unaware of the consequences of
irresponsible use.
For this reason, it is essential that educators consider how to educate their students about the
consequences associated with misusing the Internet.

SCHOOL & HOME
IDENTITY THIEF
Identity theft is a form of fraud or cheating of another person’s identity in which someone
pretends to be someone else by assuming that person’s identity, typically in order to access
resources or obtain credit and other benefits in that person’s name. Information Technology
(Amendment) Act,
2008, crime of identity theft under whoever, fraudulently or dishonestly make use of the
electronic signature, password or any other unique identification feature of any other person
known as identity theft. Identity theft is a term used to refer to fraud that involves stealing
money or getting other benefits by pretending to someone else. There is type of identity
thIef-

CREDIT CARD FRAUD
You simply have to type credit card number into www page off the vendor for
online transaction If electronic transactions are not secured the credit card numbers can be
stolen by the hackers who can misuse this card by impersonating the credit card owner.
DATA THIEF
D a Thef t i s a gr ow ng pr obl em pr i m i l y per pet r at ed by of f i ce
at
i
,
ar
w ker s w t h access t o t echnol ogy
or
i
such as deskt op com er s and handhel d devi ces, capabl e of st or i ng
put
di gi t al i nf or m i on such as f l ash dr i ves, i Pods and even di gi t al
at
cam as. The dam
er
age caused by dat a t hef t can be consi der abl e
w t h t oday’s abi l i t y t o t r ansm t ver y f i l es vi a e-m l , w
i
i
ai
eb
pages, U devi ces, D st or age and ot her hand-hel d devi ces.
SB
VD
Accor di ng t o I nf or m i on Technol ogy (Am
at
endm ) Act , 2008, cr i m of
ent
e
dat a t hef t i s st at ed as -I f any per son w t hout per m ssi on of t he
i
i
ow
ner or any ot her per son, w i s char ge of a com er , com er
ho
put
put
syst em of com er net w k - dow oads, copi es or ext r act s any
put
or
nl
dat a, com er dat a base or i nf or m i on f r om such com er , com er
put
at
put
put
syst em or com er net w k
put
or
com er syst em or com er net w k i ncl udi ng i nf or m i on or dat a
put
put
or
at
hel d or st or ed i n any r em
ovabl e st or age m um t hen i t i s dat a
edi ,
NET EXTORTION
t hef t .

C o p y i n g t h e c o m p a n y ’s c o n f i d e n t i a l
d a t a i n o r d e r t o e x t o r t s a i d c o mp a n y
PREVENTING FROM CYBER
CRIME
* Preventing cyber crime is a big deal nowadays! To keep
yourself and your information protected, always make sure you
are on secure websites.
* Do not give your computer any one else to use.
* Do not give internet to your young one to misuse . who is
unware of internet
*Keep ativirus on your computer.
* Time to time check your accout.
S U B MI T E D
T OJITENDRA
RAJAWAT

SUBMITED BYMANISH BHADRAN &
PIYUSH GURJAR

THANK YOU

More Related Content

Similar to Cyber crime

Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13
Wise Person
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
los riesgos en las redes sociales
los riesgos en las redes socialeslos riesgos en las redes sociales
los riesgos en las redes sociales
jeminariva
 
Analysis of Regional Phishing Attack
Analysis of Regional Phishing AttackAnalysis of Regional Phishing Attack
Analysis of Regional Phishing Attack
June Park
 
2040 oneGove
2040 oneGove2040 oneGove
2040 oneGove
Stephanie Figas
 
IP Institute Presentation on Internet Law
IP Institute Presentation on Internet LawIP Institute Presentation on Internet Law
IP Institute Presentation on Internet Law
Bennet Kelley
 
Internet Law Update Presentation
Internet Law Update PresentationInternet Law Update Presentation
Internet Law Update Presentation
Internet Law Center
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
Shred Station
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
University of Hertfordshire
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
Nurizcka
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
DARK WEB.pdf
DARK WEB.pdfDARK WEB.pdf
DARK WEB.pdf
silvers5
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
Velma
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
timryan7
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
guest1d1ed5
 
How Do You Define Yourself Essay. How Others Perceive You, And How
How Do You Define Yourself Essay. How Others Perceive You, And HowHow Do You Define Yourself Essay. How Others Perceive You, And How
How Do You Define Yourself Essay. How Others Perceive You, And How
Julie Potts
 

Similar to Cyber crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
los riesgos en las redes sociales
los riesgos en las redes socialeslos riesgos en las redes sociales
los riesgos en las redes sociales
 
Analysis of Regional Phishing Attack
Analysis of Regional Phishing AttackAnalysis of Regional Phishing Attack
Analysis of Regional Phishing Attack
 
2040 oneGove
2040 oneGove2040 oneGove
2040 oneGove
 
IP Institute Presentation on Internet Law
IP Institute Presentation on Internet LawIP Institute Presentation on Internet Law
IP Institute Presentation on Internet Law
 
Internet Law Update Presentation
Internet Law Update PresentationInternet Law Update Presentation
Internet Law Update Presentation
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
DARK WEB.pdf
DARK WEB.pdfDARK WEB.pdf
DARK WEB.pdf
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
How Do You Define Yourself Essay. How Others Perceive You, And How
How Do You Define Yourself Essay. How Others Perceive You, And HowHow Do You Define Yourself Essay. How Others Perceive You, And How
How Do You Define Yourself Essay. How Others Perceive You, And How
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Cyber crime

  • 1. CYBER CRIME Cyber crime is a genetic term refers to all criminal activities done using the medium of computers. The internet , cyber space and the worldwide web. or Cyber crime is any illegal behavior directed by means of electronic operation that targets the security of computer system and the data processed by them. CYBER CRIME LAWS The Indian Law has not given any definition to the term ‟CYBER CRIME‟. In fact , the indian penal code does not use a term „CYBER CRIME‟ at any point even after its amendment by the information technology (amendment)ACT 2008, the indian cyber crime.
  • 2. But “Cyber Security ” is defined under section (2) means protection information, computer resource, communication device and information stored there in from unauthorized access, use, disclosure, disruption, modification or destruction. TYPES OF CYBER CRIME •Denial of service attack •IRC crime •Credit card fraud •Phishing •Cyber stalking •Cyber defamation •Threatening •Salami attack •Hacking •Net extortion •Piracy •Financial •Schools & home •Data thief •E-mail spoofing •Identity thief •Spreading virus and worms
  • 3. HACKING The act of gaining unauthorized access to a computer system, programs, data or network resources and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed. Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user. (The term “hacker” originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it has negative implications.) Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 43(a) read with section 66 is applicable and Section 379 & 406 of Indian Penal Code, 1860 also are applicable . If crime is proved under IT Act, accused shall be punished for imprisonment, which may extend to years or with fine, which may extend to five lakh rupees or both.
  • 4. PIRACY T h e s o f t wa r e i n d u s t r y p l a y s a l e a d i n g r o l e i n c r e a t i n g p r o d u c t s t h a t h a v e v a s t l y i mp r o v e d o u r l i v e s a n d w o r k e n v i r o n me n t . Un f o r t u n a t e l y , s o f t wa r e t h e f t , o r p i r a c y , h a s h a d a n e g a t i v e i mp a c t o n t h e g l o b a l ma r k e t p l a c e a n d t h e a b i l i t y t o c r e a t e n e w p r o d u c t s . Co p y i n g i n t h e w o r k p l a c e , c o u n t e r f e i t i n g a n d v a r i o u s f o r ms o f i l l e g a l d i s t r i b u t i o n i n c o a s t . F u r t h e r mo r e , t h e u n a u t h o r i z e d e l e c t r o n i c d i s t r i b u t i o n a n d s a l e o f c o p y r i g h t e d d a t a o r s o f t wa r e i n h u g e p r i c e s , wo r k o v e r t h e I n t e r n e t t h r e a t e n s t o ma k e t h e s e p r o b l e ms s e e m a l mo s t q u a i n t b y c o mp a r i s o n . C r i me C a n b e s t o o p e d i n v a r i o u s wa y s s u c h a s e n d u s e r Inosuch icrime criminal d i s k insignificant changes in such a manner that c p y n g , h a r d makes such changes , C o u n t e r f e i t i n g , I l l e g a l d o w n l o a d s l o a d i n g would go unnoticed. e r n e t makes .such program that deducts small f r o m t h e i n t Criminal e t c amount like 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount SALAMI ATTACK
  • 5. E-MAIL SPOOFING E-mail spoofing is sending an e-mail to another person in such a way that it appears that the e-mail was sent by someone else. Spoofing is the act of electronically disguising one computer as another for gaining as the password system. It is becoming so common that you can no longer take for granted that the e-mail you are receiving is truly from the person identified as the sender. Email spoofing is a technique used by hackers to fraudulently send email messages in which the sender address and other parts of the email header are altered to appear as though the email originated from a source other than its actual source. There is another name of e-mail spoofingCYBER DEFAMATION The Criminal sends emails containing defamatory matters to all concerned of the victim or post the defamatory matters on a website. (disgruntled employee may do this against boss, ex- divorced husband against wife etc)
  • 6. SPREADING VIRUS OR c a s e s , v i r u WORMS d o a n y a m o u n t s e s c a n I n mo s t o f d a ma g e , t h e c r e a t o r i n t e n d s t h e t o d o . Th e y c a n s e n d y o u r d a t a t o a t h i r d p a r t y a n d t h e n d e l e t e y o u r d a t a f r o m y o u r c o m p u t e r . T h e y c a n a l s o r u i n /m e s s u p y o u r s y s t e m a n d r e n d e r i t u n u s a b l e w i t h o u t a r e -i n s t a l l a t i o n o f t h e o p e r a t i n g s y s t e m. U s u a l l y t h e v i r u s w i l l f i l e s o n y o u r s y s t e m a n d t h e n wi l l i n s t a l l c h a n g e y o u r s y s t e m s o t h a t v i r u s p r o g r a m i s r u n e v e r y t i me y o u s t a r t y o u r s y s t e m. E x (v i r u s , w o r m s , T r o j a n H o r s e , T i m e b o m b ,L o g i c B o mb , R a b b i t a n d B a c t e r i u m a r e t h e ma l i c i o u s While the Internet e s be a unique educational and recreational resource for students, it is s o f t w a r can ) important that they are educated about how to safely and responsibly use this powerful tool. The issue related to the presence of the young on the Internet is the potential misuse of this tool. Whether the consequences are intentional or unintentional, the Internet can open a dangerous window of accessibility for the young who are unaware of the consequences of irresponsible use. For this reason, it is essential that educators consider how to educate their students about the consequences associated with misusing the Internet. SCHOOL & HOME
  • 7. IDENTITY THIEF Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name. Information Technology (Amendment) Act, 2008, crime of identity theft under whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person known as identity theft. Identity theft is a term used to refer to fraud that involves stealing money or getting other benefits by pretending to someone else. There is type of identity thIef- CREDIT CARD FRAUD You simply have to type credit card number into www page off the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
  • 8. DATA THIEF D a Thef t i s a gr ow ng pr obl em pr i m i l y per pet r at ed by of f i ce at i , ar w ker s w t h access t o t echnol ogy or i such as deskt op com er s and handhel d devi ces, capabl e of st or i ng put di gi t al i nf or m i on such as f l ash dr i ves, i Pods and even di gi t al at cam as. The dam er age caused by dat a t hef t can be consi der abl e w t h t oday’s abi l i t y t o t r ansm t ver y f i l es vi a e-m l , w i i ai eb pages, U devi ces, D st or age and ot her hand-hel d devi ces. SB VD Accor di ng t o I nf or m i on Technol ogy (Am at endm ) Act , 2008, cr i m of ent e dat a t hef t i s st at ed as -I f any per son w t hout per m ssi on of t he i i ow ner or any ot her per son, w i s char ge of a com er , com er ho put put syst em of com er net w k - dow oads, copi es or ext r act s any put or nl dat a, com er dat a base or i nf or m i on f r om such com er , com er put at put put syst em or com er net w k put or com er syst em or com er net w k i ncl udi ng i nf or m i on or dat a put put or at hel d or st or ed i n any r em ovabl e st or age m um t hen i t i s dat a edi , NET EXTORTION t hef t . C o p y i n g t h e c o m p a n y ’s c o n f i d e n t i a l d a t a i n o r d e r t o e x t o r t s a i d c o mp a n y
  • 9. PREVENTING FROM CYBER CRIME * Preventing cyber crime is a big deal nowadays! To keep yourself and your information protected, always make sure you are on secure websites. * Do not give your computer any one else to use. * Do not give internet to your young one to misuse . who is unware of internet *Keep ativirus on your computer. * Time to time check your accout.
  • 10. S U B MI T E D T OJITENDRA RAJAWAT SUBMITED BYMANISH BHADRAN & PIYUSH GURJAR THANK YOU