SlideShare a Scribd company logo
CYBER CRIME AMONG
STUDENTS
    By : Harshpreet Kaur
What is Cyber Crime?
Computer crime refers to any crime that involves a
computer and a network.

Cybercrimes are defined as: “Offences that are
committed against individuals or groups of individuals
with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental
harm to the victim directly or indirectly, using modern
telecommunication networks such as Internet (Chat
rooms, emails, notice boards and groups) and mobile
phones (SMS/MMS)”.
India 5th among cyber crime affected
     countries
   India 5th in world after US, China, Japan
    and UAE.
   Andhra State tops in India. 349 of the
    total 1,791 cyber crime cases registered
    last year 2011 were reported from the
    state.
    Maharashtra followed with 306 cases.
    Pune is third in instances of cyber
    crime: National Crime Records Bureau
    reports.
Types of Cyber Crime
   Hacking: Hacking means unauthorized attempts to bypass the security
    mechanisms of an information system or network. Also, in simple words
    Hacking is the unauthorized access to a computer system, programs, data
    and network resources.

   Data Theft: If any person without permission of the owner or any other
    person, who is in charge of a computer, computer system of computer
    network - downloads, copies or extracts any data, computer data base or
    information from such computer, computer system or computer network
    including information or data held or stored in any removable storage
    medium, then it is data theft.

   Spreading Virus or W    orms: the virus will install files on your system and then
    will change your system so that virus program is run every time you start your
    system. It will then attempt to replicate itself by sending itself to other
Types of Cyber Crime
   Identity Theft: Identity theft is a form of fraud or cheating of another
    person’s identity in which someone pretends to be someone else by
    assuming that person’s identity, typically in order to access resources
    or obtain credit and other benefits in that person’s name.

   E-Mail Spoofing: E-mail spoofing is sending an e-mail to another
    person in such a way that it appears that the e-mail was sent by
    someone else. A spoof email is one that appears to originate from
    one source but actually has been sent from another source. Spoofing
    is the act of electronically disguising one computer as another for
    gaining as the password system. It is becoming so common that you
    can no longer take for granted that the e-mail you are receiving is
    truly from the person identified as the sender.
Cyber Crime Case: Fake Profile
   Fake Profile use is common in
    Students. Many cases have been
    registered against Fake Profiles in
    Cyber Cell.
   Some months ago, about 12
    students of a public school in Sector
    7, Chandigarh had made a fake
    profile of their teacher and posted
    objectionable comments against her.
Cyber Crime Case: Password Hacking
   Students are taking to cyber
    crimes just for fun or carrying out
    small acts such as password
    hacking to revenge on their
    teachers, friends in schools.
   Morphing pictures and posting
    them on social networking sites
    to defame others have landed
    students in trouble recently.
Cyber Crime Case: Cyber Bulling
   Cyber bullying is essentially the persistent
    harassment of an individual via technology like the
    internet, cellphone, etc.
   Low self-esteem is one of the key reasons for any
    form of bullying.
   A classmate who had a crush on girl, decided to
    take his revenge for spurning him by posting some
    pictures and her personal issues on internet which
    she had discussed with him. The girl felt so
    harassed that she shut out herself completely for
    six months. It took three counselors and a lot of
    support from her loved ones to get her back on her
    feet.
Cyber Crime Case: Phishing
   Phishing is the act of attempting to
    acquire information such as usernames,
    passwords, and credit card details.
   Phishing emails may contain links to
    websites that are infected with malware.
   A 8 year student provided father’s credit
    card details on phishing email received
    while playing online game. It lured him
    to upgrade his game.
Teacher’s Role To Prevent Cyber Crime
   Character Education is very important to
    prevent any type of crime in the society.
   Personality development of student
    should be given preference in
    comparison to rote learning.
   Students should be guided about the
    following points regarding the use of
    Internet
       Don't give out personal information in
        chatrooms, social websites, blogs, etc.
       Don't tell anyone, even your best friends,
        your passwords.

     Teacher’s Role To Prevent Cyber Crime
    Continued……
       Don't give out personal information in
        chatrooms, social websites, blogs, etc.
       If they receive any mean or threatening
        messages in the chatroom, text or email,
        don't ever respond. Don’t delete the
        message, save it and show to an adult - they
        might need the message to use as evidence
        against the person who sent it.
       If they find mean things have been said
        about them on a website, for example,
        MySpace or Facebook, student can ask to
        have the comments removed. The same
        is true if they find out that photographs or
        videos have been posted without your
Teacher’s Role To Prevent Cyber Crime

   Continued……
       Don't suffer in silence. If they are being
        bullied then they should tell their parents. If
        they don't feel to talk to them then tell a
        teacher or an adult that you trust. You
        mustn't keep it to yourself because if you do,
        the bully has got exactly what they want.
       They should be made aware about cyber
        bullying and that it is a punishable offence
        as per cyber law.
CYBER CRIME AMONG
STUDENTS

More Related Content

What's hot

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
Dababrata Mondal
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mazhar Nazik
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
Adeel Rasheed
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
Onkar1431
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Surakshya Poudel
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
dixitas
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 

What's hot (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Viewers also liked

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
Anchalanshri Dixit
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
 
Złośliwi użytkownicy internetu
Złośliwi użytkownicy internetuZłośliwi użytkownicy internetu
Złośliwi użytkownicy internetuMichal11
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Jeet Swain
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 

Viewers also liked (7)

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Złośliwi użytkownicy internetu
Złośliwi użytkownicy internetuZłośliwi użytkownicy internetu
Złośliwi użytkownicy internetu
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Cyber crime among students

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
kschermerhorn
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullyingparulata
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
FrenzyPurisima
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
Sanil Shrivastava
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
3610Instructor
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
Chris483410
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
College Papers Writing Service
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safetyheidirobison
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of CyberbullyingIC
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 

Similar to Cyber crime among students (20)

Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safety
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of Cyberbullying
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Recently uploaded

The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 

Recently uploaded (20)

The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 

Cyber crime among students

  • 1. CYBER CRIME AMONG STUDENTS By : Harshpreet Kaur
  • 2. What is Cyber Crime? Computer crime refers to any crime that involves a computer and a network. Cybercrimes are defined as: “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)”.
  • 3. India 5th among cyber crime affected countries  India 5th in world after US, China, Japan and UAE.  Andhra State tops in India. 349 of the total 1,791 cyber crime cases registered last year 2011 were reported from the state.  Maharashtra followed with 306 cases.  Pune is third in instances of cyber crime: National Crime Records Bureau reports.
  • 4. Types of Cyber Crime  Hacking: Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. Also, in simple words Hacking is the unauthorized access to a computer system, programs, data and network resources.  Data Theft: If any person without permission of the owner or any other person, who is in charge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium, then it is data theft.  Spreading Virus or W orms: the virus will install files on your system and then will change your system so that virus program is run every time you start your system. It will then attempt to replicate itself by sending itself to other
  • 5. Types of Cyber Crime  Identity Theft: Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.  E-Mail Spoofing: E-mail spoofing is sending an e-mail to another person in such a way that it appears that the e-mail was sent by someone else. A spoof email is one that appears to originate from one source but actually has been sent from another source. Spoofing is the act of electronically disguising one computer as another for gaining as the password system. It is becoming so common that you can no longer take for granted that the e-mail you are receiving is truly from the person identified as the sender.
  • 6. Cyber Crime Case: Fake Profile  Fake Profile use is common in Students. Many cases have been registered against Fake Profiles in Cyber Cell.  Some months ago, about 12 students of a public school in Sector 7, Chandigarh had made a fake profile of their teacher and posted objectionable comments against her.
  • 7. Cyber Crime Case: Password Hacking  Students are taking to cyber crimes just for fun or carrying out small acts such as password hacking to revenge on their teachers, friends in schools.  Morphing pictures and posting them on social networking sites to defame others have landed students in trouble recently.
  • 8. Cyber Crime Case: Cyber Bulling  Cyber bullying is essentially the persistent harassment of an individual via technology like the internet, cellphone, etc.  Low self-esteem is one of the key reasons for any form of bullying.  A classmate who had a crush on girl, decided to take his revenge for spurning him by posting some pictures and her personal issues on internet which she had discussed with him. The girl felt so harassed that she shut out herself completely for six months. It took three counselors and a lot of support from her loved ones to get her back on her feet.
  • 9. Cyber Crime Case: Phishing  Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details.  Phishing emails may contain links to websites that are infected with malware.  A 8 year student provided father’s credit card details on phishing email received while playing online game. It lured him to upgrade his game.
  • 10. Teacher’s Role To Prevent Cyber Crime  Character Education is very important to prevent any type of crime in the society.  Personality development of student should be given preference in comparison to rote learning.  Students should be guided about the following points regarding the use of Internet  Don't give out personal information in chatrooms, social websites, blogs, etc.  Don't tell anyone, even your best friends, your passwords.
  • 11. Teacher’s Role To Prevent Cyber Crime Continued……  Don't give out personal information in chatrooms, social websites, blogs, etc.  If they receive any mean or threatening messages in the chatroom, text or email, don't ever respond. Don’t delete the message, save it and show to an adult - they might need the message to use as evidence against the person who sent it.  If they find mean things have been said about them on a website, for example, MySpace or Facebook, student can ask to have the comments removed. The same is true if they find out that photographs or videos have been posted without your
  • 12. Teacher’s Role To Prevent Cyber Crime  Continued……  Don't suffer in silence. If they are being bullied then they should tell their parents. If they don't feel to talk to them then tell a teacher or an adult that you trust. You mustn't keep it to yourself because if you do, the bully has got exactly what they want.  They should be made aware about cyber bullying and that it is a punishable offence as per cyber law.