SlideShare a Scribd company logo
Saturday, 14 November 2015
14MCA0103 PAWAN KURMI
14MCA0130 RAHUL JAIN
14MCA0115 BHAWNA KUMARI
Crimes are not to be measured by the issue of
events, but by the bad intensions of men.
The greatest crimes do not arise from a want of
feeling for others but from an over sensibility for
ourselves and an over indulgence in our own
desires.
Saturday, 14 November 2015
CYBER CRIME !!
Theexpression‘Crime’is definedas an act,whichsubjectsthedoerto legalpunishmentor any
offenceagainstmorality,socialorderor anyunjustor shamefulact.The“Offence"is definedin
theCodeof CriminalProcedureto meanas an actor omissionmadepunishablebyanylawfor
thetimebeinginforce.
CyberCrimeis emergingas a seriousthreat.Worldwidegovernments,policedepartmentsand
intelligenceunitshavestartedto react.
Saturday, 14 November 2015
Cyber Crime is a term used to broadly describe criminal activity in which computers
or computer networks are a tool, a target, or a place of criminal activity and include
everything from electronic cracking to denial of service attacks. It is also used to
include traditional crimes in which computers or networks are used to enable the
illicit activity.
Computer crime mainly consists of unauthorized access to computer systems data
alteration, data destruction, theft of intellectual property. Cyber crime in the context
of national security may involve hacking, traditional espionage, or information
warfare and related activities.
Pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment,
Defamation, Spam and Phishing are some examples where computers are used to
commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy
and Hacking are examples where computers become target of crime.
Saturday, 14 November 2015
IndianCrimeScene
The major Cyber Crimes reported,
in India, are Denial of
Services, Defacement of Websites, Spam,
Computer Virus and Worms, Pornography,
Cyber Squatting, Cyber Stalking and Phishing.
Given the fact that nearly $ 120 million
worth of Mobiles are being lost or stolen in the
country every year, the users have to protect
Information, Contact details and Telephone
numbers as these could be misused. Nearly 69
per cent of information theft is carried out by
current and ex-employees and 31 per cent by
hackers. India has to go a long way in
protecting the vital information.
[3 The Hindu, Saturday, Oct 27, 2007].
Saturday, 14 November 2015
Cyber Crime Variants
Hacking
"Hacking" is a crime, which entails cracking
systems and gaining unauthorized access to the
data stored in them. Hacking had witnessed a 37
per cent increase this year.
Cyber Squatting
Cyber Squatting is the act of registering a famous
Domain Name and then selling it for a fortune.
This is an issue that has not been tackled in
IT ACT 2000.
Saturday, 14 November 2015
Phishingis justoneof themanyfraudsontheInternet,trying
tofoolpeopleintopartingwiththeirmoney.Phishingrefersto
thereceiptofunsolicitedemailsbycustomersof Financial
Institutions,requestingthemtoentertheir Username,
Passwordorotherpersonalinformationtoaccesstheir
Accountforsomereason.
The fraudsterthenhasaccesstothecustomer'sonlinebank
accountandtothefundscontainedin that account.
Saturday, 14 November 2015
Cyber Stalking is use of the Internet or other
electronic means to stalk someone. This
term is used interchangeably with online
harassment and online abuse. Stalking
generally involves harassing or threatening
behaviour that an individual engages in
repeatedly, such as following a person,
appearing at a person's home or place of
business, making harassing phone calls,
leaving written messages or objects, or
vandalizing a person's property.
Saturday, 14 November 2015
Vishingis thecriminalpracticeof usingsocial
engineeringandVoiceoverIP (VoIP)to gainaccessto
privatepersonalandfinancialinformationfromthe
publicfor thepurposeof financialreward.Thetermis a
combinationof “Voice"andphishing.Vishingexploits
thepublic'strustinlandlinetelephoneservices.
Vishingis typicallyusedto stealcreditcardnumbersor
otherinformationusedinidentitytheftschemesfrom
individuals.
VISHING
Saturday, 14 November 2015
Indiastands11th intherankingfor CyberCrimeintheWorld,
constituting3%of theGlobalCyberCrime.
Saturday, 14 November 2015
Why India?
A rapidly growing online user
base
 121 Million Internet Users
 65 Million Active Internet Users,
up by 28% from 51 million in
2010
 50 Million users shop online on
Ecommerce and Online
Shopping Sites
 46+ Million Social Network
Users
 346 million mobile users had
subscribed to Data Packages.
Source: IAMAI; Juxt; wearesocial 2011Saturday, 14 November 2015
 The majority of cybercrimes are centered on forgery, fraud and
Phishing,
 India is the third-most targeted country for Phishing attacks
after the US and the UK,
 Social networks as well as ecommerce sites are major targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during 2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating spam.
CyberCrime InIndia
Saturday, 14 November 2015
CostOf Cyber Crime In India(2015)
 29.9 million people fell victim to cybercrime,
 $4 billion in direct financial losses,
 $3.6 billion in time spent resolving the crime,
 4 in 5 online adults (80%) have been a victim of
Cybercrime,
 17% of adults online have experienced cybercrime
on their mobile phone.
Source: Norton Cybercrime Report 2014
Saturday, 14 November 2015
We have covered about three instances where high-profile
government websites were hacked and defaced. However, the
actual number of Government Websites that were hacked are
quite huge.
A total number of 90, 119, 252 and 219 Government websites
tracked by the Indian Computer Emergency Response Team
(CERT-In) were hacked / defaced by various hacker groups inSaturday, 14 November 2015
 The police have recorded 3,038 cases but made only 2,700
arrests in 3 years (between 2007 and 2010)
 India registered only 1,350 cases under the IT Act and IPC in
2010
 50% of cybercrimes are not even reported.
 Again, this is
growing trend and
it is surprising that
authorities have
not taken stern
actions to curb the
growth of these
cyber-crimes.
Saturday, 14 November 2015
CyberLawsinIndia
UnderTheInformation
TechnologyAct,2000
CHAPTER XI – OFFENCES – 66. Hacking with
computer system.
(1) Whoever with the Intent to cause or knowing
that he is likely to cause Wrongful Loss or
Damage to the public or any person Destroys or
Deletes or Alters any Information Residing in a
Computer Resource or diminishes its value or
utility or affects it injuriously by any means,
commits hack.
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine which may extend up to two lakh rupees, or with both.
Saturday, 14 November 2015
Whoever without permission of
the owner of the computer :
 Secures Access;
 Downloads, Copies or extracts
any data, computer database or
any information;
 Introduce or causes to be introduce
any Virus or Contaminant;
 Disrupts or causes disruption;
 Denies or causes denial of access to any person;
 Provides any assistance to any person to
facilitate access
 Charges the services availed of by a person to
the account of another person by Tampering with
or Manipulating any Computer, Computer
System, or Computer Network;
Shall be liable to pay damages by way of
compensation not exceeding one crore rupees to
Saturday, 14 November 2015
Information Technology
Amendment Act, 2008
Section – 43,
Destroys, Deletes or Alters any Information residing in a computer resource or
diminishes its value or utility or affects it injuriously by any means;
Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy
or alter any computer source code used for a computer resource with an intention
to cause damage;
“If any person, dishonestly, or fraudulently, does any act referred to in section 43,
he shall be punishable with imprisonment for a term which may extend to two
three years or with fine which may extend to five lakh rupees or with both.” [S.66]
Saturday, 14 November 2015
S.66A - Punishment for sending offensive messages through
communication service, etc
 Any person who sends, by means of a computer resource or a
communication device;
 Any information that is grossly offensive or has menacing
character; or
 Any information which he knows to be false, but for the
purpose of causing annoyance, inconvenience, danger, obstruction,
insult, injury, criminal intimidation, enmity, hatred, or ill will,
persistently makes by making use of such computer resource or a
communication device;
 Any electronic mail or electronic mail message for the purpose of
causing annoyance or inconvenience or to deceive or to mislead
the addressee or recipient about the origin of such messages;
Shall be punishable with imprisonment for a term which may extend
to three years and with fine.
Saturday, 14 November 2015
S.66C- Punishmentforidentitytheft
“Whoever,fraudulentlyor dishonestlymakeuseof theelectronicsignature,
passwordor anyotheruniqueidentificationfeatureof anyotherperson,shallbepunished
withimprisonmentof eitherdescriptionfor a termwhichmayextendto threeyearsand
shallalsobeliableto finewhichmayextendto rupeesonelakh”
S.66D- Punishmentforcheatingbypersonationbyusingcomputerresource
“Whoever,bymeansof anycommunicationdeviceor computerresourcecheats
bypersonation,shallbepunishedwithimprisonmentof eitherdescriptionfora termwhich
mayextendto threeyearsandshallalsobeliableto finewhichmayextendto onelakh
rupees.“
Saturday, 14 November 2015
S. 66E - Punishment for violation of privacy.
“Whoever, intentionally or knowingly captures, publishes or
transmits the image of a private area of any person without his or
her consent, under circumstances violating the privacy of that
person, shall be punished with imprisonment which may extend to
three years or with fine not exceeding two lakh rupees, or with
both”
S. 67 A - Punishment for publishing or transmitting
of material containing sexually explicit act, etc. in
electronic form
“Whoever publishes or transmits or causes to be published or
transmitted in the electronic form any material which contains
sexually explicit act or conduct shall be punished on first conviction
with imprisonment of either description for a term which may
extend to five years and with fine which may extend to ten lakh
rupees”Saturday, 14 November 2015
S. 67 C - Preservation and Retention of information
by intermediaries.
“(1) Intermediary shall preserve and retain such
information as may be specified for such duration and
in such manner and format as the Central Government
may prescribe.
(2) Any intermediary who intentionally or knowingly
contravenes the provisions of sub section (1) shall be
punished with an imprisonment for a term which may
extend to three years and shall also be liable to fine.”
Saturday, 14 November 2015
Arrests& ReportsUnderITAct
 Under the IT Act, 966 cybercrime
cases were filed in 2010
420 in 2009)
 Geographic breakdown of cases
reported:
o 153 from Karnataka,
o 148 from Kerala
o 142 from Maharashtra
o 105 Andhra Pradesh
o 52 Rajasthan
o 52 Punjab
 233 persons were arrested in 2010
 33% of the cases registered were
related to hacking
 Now Chennai Kerla and andhra pradesh
Source: National Crime Records Bureau
Saturday, 14 November 2015
Arrests& ReportsUnderIPC
 Under the IPC, 356 cybercrime cases were registered in
2010 (276 cases in 2009)
 Geographic breakdown of cases reported --
o 104 from Maharashtra
o 66 Andhra Pradesh
o 46 Chhattisgarh
 The majority of these crimes were
either forgery or fraud cases.
Source: National Crime Records Bureau
Saturday, 14 November 2015
How to Tackle Such Activities?
An important question arises that how can these crimes be prevented. A
number of techniques and solutions have been presented but the problems still
exists and are increasing day by day.
Antivirus And Anti Spyware Software:
Аntivirus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software. Anti spy
wares are used to restrict backdoor program, trojans and other spy wares to be
installed on the computer.
Firewalls:
A firewall protects a computer network from unauthorized access. Network
firewalls may be hardware devices, software programs, or a combination of the
two. A network firewall typically guards an internal computer network against
malicious access from outside the network.
Saturday, 14 November 2015
Cryptography:
Cryptography is the science of encrypting and decrypting
information. Encryption is like sending a postal mail to another
party with a lock code on the envelope which is known only to
the sender and the recipient. A number of cryptographic
methods have been developed and some of them are still not
cracked.
Cyber Ethics and Laws:
Cyber ethics and cyber laws are also being formulated to stop
cyber crimes. It is a responsibility of every individual to follow
cyber ethics and cyber laws so that the increasing cyber crimes
shall reduce. Security Software like Anti Viruses and Anti Spy
Wares should be installed on all computers, in order to remain
secure from Cyber Crimes. Internet Service Providers should also
provide high level of security at their servers in order to keep
their clients secure from all types of viruses and malicious
programs.
Saturday, 14 November 2015
The Futureof Cyber-Crimesin India
• Continued Website Hacks and
Defacements
• Data and Information theft
• Increasing phishing attacks on
Ecommerce and Financial Websites
• Cybercriminals targeting Social and
Professional Networks
• Threats directed at the Mobile Platform:
Smartphones and Tablets
Saturday, 14 November 2015
Conclusion…
“IndianLawsarewelldraftedandarecapableof handlingallkindsof
challengesas posedbycybercriminals.However,theenforcement
agenciesarerequiredto bewellversedwiththechangingtechnologies
andLaws.”
"Asinternet technologyadvancesso doesthethreatof cybercrime.In
timeslikethesewe must protectourselvesfromcybercrime.Anti-
virussoftware,firewallsandsecuritypatchesarejust thebeginning.
Neveropensuspiciouse-mailsandonlynavigateto trustedsites.”
Saturday, 14 November 2015
THANK
YOU!!

More Related Content

What's hot

Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
ambadesuhas
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
Ujjwal Tripathi
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
Teeth Maestro
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
IJARIIT
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
solomon24
 
Cyber security
Cyber security Cyber security
Cyber security
REVA UNIVERSITY
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
gsmonga
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
Niti Dhruva
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
ishmecse13
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
Yash
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
S.M.Mustofa Kauser
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Adv Prashant Mali
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rafel Ivgi
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
Faridah Husin
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
Muhammad Zubair
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Dilip Prajapati
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Surakshya Poudel
 

What's hot (20)

Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Cyber security
Cyber security Cyber security
Cyber security
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Cyber crime

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
Aman Bhargava
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
Aalbert Albert
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
DINESH KAMBLE
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
jcgevana
 
It presentation cyber crime
It presentation cyber crimeIt presentation cyber crime
It presentation cyber crime
Ashish Ojha
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
DivithC
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
kirtigoyal328
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
KrishnaGupta769783
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aamir Malik
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
Aditya Singh Rana
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
Dr.Keshav Sathaye
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
angellaclarianes1
 
Online Safety and Security
Online Safety and SecurityOnline Safety and Security
Online Safety and Security
PaulFajardo7
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
ReyLouieSedigo1
 

Similar to Cyber crime (20)

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
It presentation cyber crime
It presentation cyber crimeIt presentation cyber crime
It presentation cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
Online Safety and Security
Online Safety and SecurityOnline Safety and Security
Online Safety and Security
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Cyber crime

  • 1. Saturday, 14 November 2015 14MCA0103 PAWAN KURMI 14MCA0130 RAHUL JAIN 14MCA0115 BHAWNA KUMARI
  • 2. Crimes are not to be measured by the issue of events, but by the bad intensions of men. The greatest crimes do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desires. Saturday, 14 November 2015
  • 3. CYBER CRIME !! Theexpression‘Crime’is definedas an act,whichsubjectsthedoerto legalpunishmentor any offenceagainstmorality,socialorderor anyunjustor shamefulact.The“Offence"is definedin theCodeof CriminalProcedureto meanas an actor omissionmadepunishablebyanylawfor thetimebeinginforce. CyberCrimeis emergingas a seriousthreat.Worldwidegovernments,policedepartmentsand intelligenceunitshavestartedto react. Saturday, 14 November 2015
  • 4. Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities. Pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment, Defamation, Spam and Phishing are some examples where computers are used to commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy and Hacking are examples where computers become target of crime. Saturday, 14 November 2015
  • 5. IndianCrimeScene The major Cyber Crimes reported, in India, are Denial of Services, Defacement of Websites, Spam, Computer Virus and Worms, Pornography, Cyber Squatting, Cyber Stalking and Phishing. Given the fact that nearly $ 120 million worth of Mobiles are being lost or stolen in the country every year, the users have to protect Information, Contact details and Telephone numbers as these could be misused. Nearly 69 per cent of information theft is carried out by current and ex-employees and 31 per cent by hackers. India has to go a long way in protecting the vital information. [3 The Hindu, Saturday, Oct 27, 2007]. Saturday, 14 November 2015
  • 6. Cyber Crime Variants Hacking "Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year. Cyber Squatting Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune. This is an issue that has not been tackled in IT ACT 2000. Saturday, 14 November 2015
  • 7. Phishingis justoneof themanyfraudsontheInternet,trying tofoolpeopleintopartingwiththeirmoney.Phishingrefersto thereceiptofunsolicitedemailsbycustomersof Financial Institutions,requestingthemtoentertheir Username, Passwordorotherpersonalinformationtoaccesstheir Accountforsomereason. The fraudsterthenhasaccesstothecustomer'sonlinebank accountandtothefundscontainedin that account. Saturday, 14 November 2015
  • 8. Cyber Stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. Saturday, 14 November 2015
  • 9. Vishingis thecriminalpracticeof usingsocial engineeringandVoiceoverIP (VoIP)to gainaccessto privatepersonalandfinancialinformationfromthe publicfor thepurposeof financialreward.Thetermis a combinationof “Voice"andphishing.Vishingexploits thepublic'strustinlandlinetelephoneservices. Vishingis typicallyusedto stealcreditcardnumbersor otherinformationusedinidentitytheftschemesfrom individuals. VISHING Saturday, 14 November 2015
  • 10. Indiastands11th intherankingfor CyberCrimeintheWorld, constituting3%of theGlobalCyberCrime. Saturday, 14 November 2015
  • 11. Why India? A rapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages. Source: IAMAI; Juxt; wearesocial 2011Saturday, 14 November 2015
  • 12.  The majority of cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam. CyberCrime InIndia Saturday, 14 November 2015
  • 13. CostOf Cyber Crime In India(2015)  29.9 million people fell victim to cybercrime,  $4 billion in direct financial losses,  $3.6 billion in time spent resolving the crime,  4 in 5 online adults (80%) have been a victim of Cybercrime,  17% of adults online have experienced cybercrime on their mobile phone. Source: Norton Cybercrime Report 2014 Saturday, 14 November 2015
  • 14. We have covered about three instances where high-profile government websites were hacked and defaced. However, the actual number of Government Websites that were hacked are quite huge. A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked / defaced by various hacker groups inSaturday, 14 November 2015
  • 15.  The police have recorded 3,038 cases but made only 2,700 arrests in 3 years (between 2007 and 2010)  India registered only 1,350 cases under the IT Act and IPC in 2010  50% of cybercrimes are not even reported.  Again, this is growing trend and it is surprising that authorities have not taken stern actions to curb the growth of these cyber-crimes. Saturday, 14 November 2015
  • 16. CyberLawsinIndia UnderTheInformation TechnologyAct,2000 CHAPTER XI – OFFENCES – 66. Hacking with computer system. (1) Whoever with the Intent to cause or knowing that he is likely to cause Wrongful Loss or Damage to the public or any person Destroys or Deletes or Alters any Information Residing in a Computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. Saturday, 14 November 2015
  • 17. Whoever without permission of the owner of the computer :  Secures Access;  Downloads, Copies or extracts any data, computer database or any information;  Introduce or causes to be introduce any Virus or Contaminant;  Disrupts or causes disruption;  Denies or causes denial of access to any person;  Provides any assistance to any person to facilitate access  Charges the services availed of by a person to the account of another person by Tampering with or Manipulating any Computer, Computer System, or Computer Network; Shall be liable to pay damages by way of compensation not exceeding one crore rupees to Saturday, 14 November 2015
  • 18. Information Technology Amendment Act, 2008 Section – 43, Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; “If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.” [S.66] Saturday, 14 November 2015
  • 19. S.66A - Punishment for sending offensive messages through communication service, etc  Any person who sends, by means of a computer resource or a communication device;  Any information that is grossly offensive or has menacing character; or  Any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device;  Any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages; Shall be punishable with imprisonment for a term which may extend to three years and with fine. Saturday, 14 November 2015
  • 20. S.66C- Punishmentforidentitytheft “Whoever,fraudulentlyor dishonestlymakeuseof theelectronicsignature, passwordor anyotheruniqueidentificationfeatureof anyotherperson,shallbepunished withimprisonmentof eitherdescriptionfor a termwhichmayextendto threeyearsand shallalsobeliableto finewhichmayextendto rupeesonelakh” S.66D- Punishmentforcheatingbypersonationbyusingcomputerresource “Whoever,bymeansof anycommunicationdeviceor computerresourcecheats bypersonation,shallbepunishedwithimprisonmentof eitherdescriptionfora termwhich mayextendto threeyearsandshallalsobeliableto finewhichmayextendto onelakh rupees.“ Saturday, 14 November 2015
  • 21. S. 66E - Punishment for violation of privacy. “Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both” S. 67 A - Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form “Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees”Saturday, 14 November 2015
  • 22. S. 67 C - Preservation and Retention of information by intermediaries. “(1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe. (2) Any intermediary who intentionally or knowingly contravenes the provisions of sub section (1) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.” Saturday, 14 November 2015
  • 23. Arrests& ReportsUnderITAct  Under the IT Act, 966 cybercrime cases were filed in 2010 420 in 2009)  Geographic breakdown of cases reported: o 153 from Karnataka, o 148 from Kerala o 142 from Maharashtra o 105 Andhra Pradesh o 52 Rajasthan o 52 Punjab  233 persons were arrested in 2010  33% of the cases registered were related to hacking  Now Chennai Kerla and andhra pradesh Source: National Crime Records Bureau Saturday, 14 November 2015
  • 24. Arrests& ReportsUnderIPC  Under the IPC, 356 cybercrime cases were registered in 2010 (276 cases in 2009)  Geographic breakdown of cases reported -- o 104 from Maharashtra o 66 Andhra Pradesh o 46 Chhattisgarh  The majority of these crimes were either forgery or fraud cases. Source: National Crime Records Bureau Saturday, 14 November 2015
  • 25. How to Tackle Such Activities? An important question arises that how can these crimes be prevented. A number of techniques and solutions have been presented but the problems still exists and are increasing day by day. Antivirus And Anti Spyware Software: Аntivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, trojans and other spy wares to be installed on the computer. Firewalls: A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network. Saturday, 14 November 2015
  • 26. Cryptography: Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. A number of cryptographic methods have been developed and some of them are still not cracked. Cyber Ethics and Laws: Cyber ethics and cyber laws are also being formulated to stop cyber crimes. It is a responsibility of every individual to follow cyber ethics and cyber laws so that the increasing cyber crimes shall reduce. Security Software like Anti Viruses and Anti Spy Wares should be installed on all computers, in order to remain secure from Cyber Crimes. Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs. Saturday, 14 November 2015
  • 27. The Futureof Cyber-Crimesin India • Continued Website Hacks and Defacements • Data and Information theft • Increasing phishing attacks on Ecommerce and Financial Websites • Cybercriminals targeting Social and Professional Networks • Threats directed at the Mobile Platform: Smartphones and Tablets Saturday, 14 November 2015
  • 28. Conclusion… “IndianLawsarewelldraftedandarecapableof handlingallkindsof challengesas posedbycybercriminals.However,theenforcement agenciesarerequiredto bewellversedwiththechangingtechnologies andLaws.” "Asinternet technologyadvancesso doesthethreatof cybercrime.In timeslikethesewe must protectourselvesfromcybercrime.Anti- virussoftware,firewallsandsecuritypatchesarejust thebeginning. Neveropensuspiciouse-mailsandonlynavigateto trustedsites.” Saturday, 14 November 2015