SlideShare a Scribd company logo
MADE BY-
VINAY PANCHOLI
15ESKCS184
SUBMITTED TO-
Mr. SUNIL DHANKHAR
(Associate Professor)
INTRODUCTION
HISTORY OF CYBER CRIME
CATEGORIES OF CYBER CRIME
TYEPS OF CYBER CRIME
PREVENTION
CYBER LAW OF INDIA
IT ACT 2000
SECTIONS OF IT ACT
CONCLUSION
CONTENT
INTRODUCTION
Cyber crime is an activity
done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.
Cybercrime is defined as a crime in which a
computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to
commit an offense (child pornography, hate
crimes).
INTRODUCTION
Cyber crime is an activity
done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.
• The first recorded cyber crime took place in 1820.
• That is not surprising considering the fact that the
abacus, which is thought to be the earliest from of
a computer, has been around since 3500 B.c.
• In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
• The first spam email took place in 1976 when it
was sent out over the ARPANT.
• The first virus was installed on an Apple computer
in 1982 when a high school student, Rich skrenta,
developed the EIK Cloner.
INTRODUCTION
Cyber crime is an activity
done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.
We can categorize cyber crime in two ways.
• The computer as a target :- using a computer
to attacks other computer, e.g. Hacking,
virus/worms attacks, Dos attack etc.
• The computer as a weapon :- using a
computer to commit real world crime e.g.
cyber terrorism, credit card fraud and
child pornography etc.
Hacking
Child Pornography
Denial of service attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Piracy
HACKING :- Hacking in simple terms means an illegal
intrusion info a computer system and/or network . It is also
known as CRACKING. Government websites are the hot
target of the hackers due to the press coverage, it receives.
Hackers enjoy the media coverage.
Motive behind the crime called HACKERS.
Motive behind the crime called hacking greed power,
publicity, revenge, adventure desire to access forbidden
information destructive mindset wants to sell n/w security
services.
DENIAL OF SERVICE ATTACKS : This is an act by the
criminals who floods the bandwidth of the victims network
or fills his E-mail box with spam mail depriving him of the
service he is entitled to access or provide. Many DOS
attacks, such as the ping of death and Tear drop attacks.
VIRUS DISSMINITION : Malicious software that attaches
itself to other software. VIRUS , WORMS, TROJAN HORSE
,WEB JACKING, E-MAIL BOMBING etc.
COMPUTER VANDALISM : Damaging or destroying data
rather than stealing or misusing them is called cyber
vandalism. These are program that attach themselves to a
file and then circulate.
CYBER TERRORISM : Terrorist attacks on the Internet is
by distributed denial of service attacks, hate websites
and hate E-mails , attacks on service network etc.
SOFTWARE PIRACY : Theft of software through the
illegal copying of genuine programs or the counterfeiting
and distribution of products intended to pass for the
original.
1. Use a full-service internet security suite
2. Use strong passwords
3. Keep your software updated
4. Manage your social media settings
5. Strengthen your home network
6. Know what to do if you become a victim
7. Different site, different passwords
8. If in doubt, block
9. Don't bank on public wi-fi
10. Only shop online on secure sites
11. More than one email account
12. Two-step verification
Cyber crime can involve criminal activities that are
traditional in nature, such as theft, fraud, deformation
and mischief, all of which are subjected to the India
Penal code. In simple way we can say that cyber crime is
unlawful acts where in the computer is either a tool or
both.
The abuse of computer has also given birth of new age
crime that are addressed by the
Information Technology Act,2000
The Information Technology Act, 2000 (also known as ITA-
2000, or the IT Act) is an Act of the Indian Parliament (No 21
of 2000) notified on 17 October 2000. It is the primary law
in India dealing with cybercrime and electronic commerce. It
is based on the United Nations Model Law on Electronic
Commerce 1996 (UNCITRAL Model) recommended by the
General Assembly of United Nations by a resolution dated 30
January 1997.
The original Act contained 94 sections, divided in 13 chapters
and 4 schedules. The laws apply to the whole of India.
Persons of other nationalities can also be indicted under the
law, if the crime involves a computer or network located in
India
Cybercrime is indeed getting the
recognition it deserves. However, it
is not going to restricted that
easily . In fact , it is highly likely
that cyber crime and its hackers
will continue developing and
upgrading to stay ahead of the law.
So, to make us a safer we must
need cyber security.
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay

More Related Content

What's hot

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
Assignment Studio
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
ishmecse13
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
Nikhil Naren
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
Hardik Solanki
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
Cyber law
Cyber lawCyber law
Cyber law
Umang Maheshwari
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cyber crime
cyber crimecyber crime
cyber crime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber law
Cyber lawCyber law
Cyber law
 

Similar to Cyber Crime and Cyber Law of India BY Vinay

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
RishabhJain916
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rishabh Jain
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
raja jawahar
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
Avinash Katariya
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cybercrime
CybercrimeCybercrime
Cybercrime
dhru shah
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
Sourav Kumar Mund
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Presentation1
Presentation1Presentation1
Presentation1
Shivangi Sharma
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
VipinRawat52
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
vivek sharma
 

Similar to Cyber Crime and Cyber Law of India BY Vinay (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Presentation1
Presentation1Presentation1
Presentation1
 
English in written
English in writtenEnglish in written
English in written
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Cyber Crime and Cyber Law of India BY Vinay

  • 1.
  • 2. MADE BY- VINAY PANCHOLI 15ESKCS184 SUBMITTED TO- Mr. SUNIL DHANKHAR (Associate Professor)
  • 3. INTRODUCTION HISTORY OF CYBER CRIME CATEGORIES OF CYBER CRIME TYEPS OF CYBER CRIME PREVENTION CYBER LAW OF INDIA IT ACT 2000 SECTIONS OF IT ACT CONCLUSION CONTENT
  • 4. INTRODUCTION Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both. Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes).
  • 5. INTRODUCTION Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both. • The first recorded cyber crime took place in 1820. • That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c. • In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. • The first spam email took place in 1976 when it was sent out over the ARPANT. • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 6. INTRODUCTION Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both. We can categorize cyber crime in two ways. • The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. • The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and child pornography etc.
  • 7. Hacking Child Pornography Denial of service attack Virus Dissemination Computer Vandalism Cyber Terrorism Software Piracy
  • 8. HACKING :- Hacking in simple terms means an illegal intrusion info a computer system and/or network . It is also known as CRACKING. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS. Motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services.
  • 9. DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks. VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc. COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.
  • 10. CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc. SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 11.
  • 12. 1. Use a full-service internet security suite 2. Use strong passwords 3. Keep your software updated 4. Manage your social media settings 5. Strengthen your home network 6. Know what to do if you become a victim 7. Different site, different passwords 8. If in doubt, block 9. Don't bank on public wi-fi 10. Only shop online on secure sites 11. More than one email account 12. Two-step verification
  • 13. Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act,2000
  • 14. The Information Technology Act, 2000 (also known as ITA- 2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997. The original Act contained 94 sections, divided in 13 chapters and 4 schedules. The laws apply to the whole of India. Persons of other nationalities can also be indicted under the law, if the crime involves a computer or network located in India
  • 15.
  • 16.
  • 17. Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.