SlideShare a Scribd company logo
Mohammad Hussain
B.Tech CSE, 2nd year
Roll-150101116
SHARDA UNIVERSITY
$$ Ever since men began to modify their lives by
using technology they have found themselves in a
series of technological traps $$
 INTRODUCTION
 HISTORY OF CYBER CRIME
 CATEGORIES OF CYBER CRIME
 TYPES OF CYBER CRIME
 ADVANTAGES OF CYBER SECURITY
 PREVENTION TO CYBER CRIME
 CYBER LAW OF INDIA
 CONCLUSION
Cyber crimes are criminal offenses committed via
the internet or otherwise aided by various forms
of computer technology such as the use of online
social network to bully others or sending sexually
explicit digital photos with a smart phone.
Cybercrime first started with hackers trying to
break into computer networks. Some did it just
for the thrill of accessing high-level security
networks, but others sought to gain sensitive,
classified material. Eventually, criminals started
to infect computer systems with computer
viruses which led to breakdowns on personal and
business computers.
 The first recorded cyber crime took place in
1820.
The first spam email took place in 1976 when it was
sent out over the ARPANT.
 The first virus was instilled on an Apple computer
in 1982 when a high school student, Rich Skrenta,
developed the EIK Cloner.
1.The computer as a target:- Using a computer to
attacks other computer. Example- Hacking, virus
attacks.
2.The computer as a weapon:- Using a computer
to commit real world crime. Example- Cyber
terrorism, pornography.
 HACKING: Hacking is simple terms means an
illegal intrusion into a computer system and
network. It is also known as cracking.
 DENIAL OF SERVICE ATTACK: This is an act by
the criminals who floods the bandwith of the
victims network or fills his E-mail box with spam
mail depriving him of the service he is entitled to
access or provide.
 CHILD PORNOGRAPHY: The internet is being
highly used by its abusers to reach and abuse
children sexually, worldwide. As more homes have
access to internet, more children would be using
the internet and more are the chances of falling
victim to the aggression of Pedophiles.
VIRUS DISSMINITION :Malicious software that
attaches itself to other software. VIRUS,
WORMS,TROJAN HORSE.
 COMPUTER VANDALISM: Damaging or
destroying data rather than stealing or misusing
them is called cyber vandalism. These are program
that attach themselves to a file and them circulate.
 CYBER TERRORISM: Terrorist attacks on the
interest is by disturbed denial of service attacks,hate
websites and hate E-mails, attacks on service
network etc.
SOFTWARE PIRACY: Theft of software through the
illegal copying or genuine programs or the
counterfeiting and disturbed of products intended to
pass for the original.
CYBER SECURITY: Cyber Security involves
protection of sensitive personal and business
information through prevention, detection and
response to different online attacks, Cyber
security actually preventing the attacks, cyber
security.
PRIVACY POLICY: Before submitting your name,
e-mail, address, on a website look for the sites
privacy policy.
KEEP SOFTWARE UP TO DATE: If the seller
reduces patches for the software operating system
your device, instill them as soon as possible.
 The cyber security will defend us from critical
attacks.
 It helps us to browse the site, website.
 Internet security process all the incoming and
outgoing data on your computer.
 It will defend us from hacks and virus.
 Application of cyber security used in our PC
needs update every week.
 Use antivirus software’s.
 Insert firewalls.
 Unstill unnecessary software.
 Maintain backup.
 Check security setting.
 Stay anonymous choose a genderless screen
name.
 Never give your full name or address to
strangers.
 Learn more about internet privacy.
Cyber Crime can involve criminal activities that
are traditional in nature, such as theft, fraud,
deformation and mischief, all of which are
subjected to the India Penal Code. In simple way
we can say that Cyber Crime is unlawful acts
where in the computer is either a tool or both.
The abuse of computer has also given birth of new
age Crime that are addresses by the Information
Technology Act, 2000.
Cybercrime is indeed getting the recognition it
deserves. However, it is not going to restricted
that easily. Infact, it is highly likely that Cyber
Crime and its hackers will continue developing
and upgrading to stay ahead of the law.
So, to make and us a safer we must need Cyber
Security.
Cyber crime and Security

More Related Content

What's hot

Cyber crime
Cyber crimeCyber crime
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
Cyber security
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mahabubur Rahman
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Similar to Cyber crime and Security

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
RishabhJain916
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rishabh Jain
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
Avinash Katariya
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
raja jawahar
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
Hussain777
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
Anuj Bhardwaj
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Anuj Bhardwaj
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
vivek sharma
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
BasitShah18
 

Similar to Cyber crime and Security (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 

Recently uploaded

Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 

Recently uploaded (20)

Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 

Cyber crime and Security

  • 1. Mohammad Hussain B.Tech CSE, 2nd year Roll-150101116 SHARDA UNIVERSITY $$ Ever since men began to modify their lives by using technology they have found themselves in a series of technological traps $$
  • 2.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYPES OF CYBER CRIME  ADVANTAGES OF CYBER SECURITY  PREVENTION TO CYBER CRIME  CYBER LAW OF INDIA  CONCLUSION
  • 3. Cyber crimes are criminal offenses committed via the internet or otherwise aided by various forms of computer technology such as the use of online social network to bully others or sending sexually explicit digital photos with a smart phone.
  • 4. Cybercrime first started with hackers trying to break into computer networks. Some did it just for the thrill of accessing high-level security networks, but others sought to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses which led to breakdowns on personal and business computers.  The first recorded cyber crime took place in 1820.
  • 5. The first spam email took place in 1976 when it was sent out over the ARPANT.  The first virus was instilled on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the EIK Cloner.
  • 6. 1.The computer as a target:- Using a computer to attacks other computer. Example- Hacking, virus attacks. 2.The computer as a weapon:- Using a computer to commit real world crime. Example- Cyber terrorism, pornography.
  • 7.  HACKING: Hacking is simple terms means an illegal intrusion into a computer system and network. It is also known as cracking.  DENIAL OF SERVICE ATTACK: This is an act by the criminals who floods the bandwith of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide.  CHILD PORNOGRAPHY: The internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles.
  • 8. VIRUS DISSMINITION :Malicious software that attaches itself to other software. VIRUS, WORMS,TROJAN HORSE.  COMPUTER VANDALISM: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and them circulate.  CYBER TERRORISM: Terrorist attacks on the interest is by disturbed denial of service attacks,hate websites and hate E-mails, attacks on service network etc. SOFTWARE PIRACY: Theft of software through the illegal copying or genuine programs or the counterfeiting and disturbed of products intended to pass for the original.
  • 9. CYBER SECURITY: Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks, Cyber security actually preventing the attacks, cyber security. PRIVACY POLICY: Before submitting your name, e-mail, address, on a website look for the sites privacy policy. KEEP SOFTWARE UP TO DATE: If the seller reduces patches for the software operating system your device, instill them as soon as possible.
  • 10.  The cyber security will defend us from critical attacks.  It helps us to browse the site, website.  Internet security process all the incoming and outgoing data on your computer.  It will defend us from hacks and virus.  Application of cyber security used in our PC needs update every week.
  • 11.  Use antivirus software’s.  Insert firewalls.  Unstill unnecessary software.  Maintain backup.  Check security setting.  Stay anonymous choose a genderless screen name.  Never give your full name or address to strangers.  Learn more about internet privacy.
  • 12. Cyber Crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal Code. In simple way we can say that Cyber Crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age Crime that are addresses by the Information Technology Act, 2000.
  • 13. Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. Infact, it is highly likely that Cyber Crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make and us a safer we must need Cyber Security.