SlideShare a Scribd company logo
1 of 29
CYBER
AWARENESS
Dr. Shweta Singh
Assistant Professor
Dept. of English
KMGGPGC Badalpur
Overview
◦ Definition of cyber crime
◦ Difference between conventional crime and cyber crime
◦ Why should we know about cyber crime?
◦ Categories of cyber crime
◦ Detailed classification of cyber crimes
◦ How to prevent cyber crime?
◦ Cyber laws in India
◦ How to approach cyber cell?
Definition
◦ Cyber crime is a crime that involves a computer and a network. It is also known
as computer crimes.
◦ While most cyber crimes are carried out to generate profit for the cyber criminals,
some cyber crimes are carried out against devices directly to damage them.
DISTINCTION BETWEEN
CONVENTIONAL CRIME
AND CYBER CRIME
A major difference between conventional and cybercrime is length of
investigations. Since cybercrime involves perpetrators using falsified names and
working from remote locations, it usually takes longer to identify the real cyber
criminals and apprehend them. In most cases, cyber criminals escape from arrest
because the investigators cannot locate them. Conventional crimes take shorter
time period to investigate because the criminals usually leave evidence that can be
used to spot them.
WHY SHOULD WE KNOW
ABOUT CYBER CRIME?
Cyber crimes in India
spiked nearly nine times
since 2013
◦ India recorded 50,035 cases of cyber crime in 2020, with a
11.8% surge in such offences over the previous year, as 578
incidents of "fake news on social media" were also reported,
official data showed on September 15.
◦ The rate of cyber crime (incidents per lakh population) also
increased from 3.3% in 2019 to 3.7% in 2020 in the country,
according to the National Crime Records Bureau (NCRB)
data.
◦ Source-https://www.thehindu.com/news/national/india-
reported-118-rise-in-cyber-crime-in-2020-578-incidents-of-
fake-news-on-social-media-data/article36480525.ece
◦ https://www.news18.com/news/india/cyber-crimes-in-
india-spiked-nearly-nine-times-since-2013-up-topped-
chart-in-2020-data-4210703.html
Categories of Cyber Crime
Computer as a target Computer as a tool
Computer as a
target
◦ Computer Viruses
◦ Denial of service attacks
◦ Malware (malicious code)
Computer Viruses
◦ A computer virus is a type of computer program that, when, executed replicates
itself by modifying other computer programs and inserting its own code.
◦ I LOVE YOU- It is one of the most destructive viruses of all time. The virus
came in an email with a subject line that said “ I Love You”
◦ MyDoom
◦ Crytolocker
◦ Sharing music, files, downloading free games invite such viruses.
◦ These viruses cause system failure and corrupt data.
How to prevent computer viruses
◦ Use antivirus protection and a firewall as-McAfee,
Norton, AVG etc
• Always keep your antivirus protection up-to-date
• Update your operating system regularly
• Increase your browser security settings
• Avoid questionable Websites
• Only download software from sites you trust.
• Carefully evaluate free software and file-sharing
applications before downloading them.
• Don't open messages from unknown senders
Denial of service (DOS) attacks
◦ DOS attacks is a cyber attack in which the perpetrator seeks to make a machine
or network resource unavailable to its intended users by temporarily disrupting
services of a host connected to a network.
◦ Web servers such as banks and credit card gateways are often target of such
attacks.
◦ Prevention- Use of effective tools to block traffic that they identify as illegitimate.
Malware
◦ Malware is any software intentionally designed to cause damage to a computer.
◦ A wide variety of malware types exist including computer viruses, worms,
ransomware, spyware.
◦ Prevention- a range of antivirus software, firewalls should be used.
Computer as a
tool
Phishing
Spamming
Identity theft & Identity Fraud
Offensive content
Ad Fraud
Online harassment
Phishing
◦ Phishing is a type of social engineering where an
attacker sends a fraudulent (fake, deceptive)
messages to trick a human victim into revealing
sensitive information.
◦ Types- email phishing, voice phishing, SMS
phishing
◦ Technique- link manipulation
◦ Prevention- extra caution
Spamming
◦ Spamming is the use of messaging systems to send multiple unsolicited messages
(spam) to large numbers of recipients for the purpose of commercial advertising.
◦ Spam can be used to spread computer viruses and malicious software.
◦ Prevention- whenever you found any suspicious or unwanted emails or messages,
just unsubscribe them.
Identity Theft and identity Fraud
◦ Identity theft occurs when someone uses another person’s personal identifying
information, like their name, identifying number, credit number, without their
permissions to commit fraud or other crimes.
◦ Types of fraud and theft- Bank fraud, card fraud, identity document forgery
◦ Prevention-
◦ Use strong passwords
◦ Never divulge personal information data in response to an email, text or phone
call unless you are certain that the request is from a bona fide source.
Offensive Content
◦ Child Pornography
◦ The content of websites and other electronic communications may be distasteful,
offensive for a variety of reasons. In some instances, these communications may
be illegal.
◦ The extent to which these communications are unlawful varies greatly between
countries, and even within nations. It is a sensitive area in which the courts can
become involved in arbitrating between groups with strong beliefs.
Ad Fraud
◦ Ad fraud is the categorical term inclusive of all forms of online advertising
frauds.
◦ App install fraud
◦ Click spam
Online harassment
◦ Cyberbullying
◦ Online predator
◦ Cyberstalking
◦ Cyber racism
◦ Internet Troll
Organised Cyber crimes on Big scale
◦ Cyber Terrorism
◦ Cyber Extortion
◦ Cyber sex-trafficking
◦ Cyber warfare
◦ Never accept friend requests from unknown persons on social media platforms.
◦ Be cautious while sharing personal information with virtual friends whom you don’t know in real
life.
◦ Never share your passwords/ credit/debit card PIN/OTP with anyone.
◦ Disable camera permission and keep the lens of your camera closed or covered when not in use.
◦ Always log out from online accounts when you are done.
◦ Never click on a link from an untrusted source.
◦ Don’t forward any rumour or message on social media platforms till your are sure about its
authenticity.
◦ Avoid using free or unsecured Wi-Fi for logging into your profiles.
◦ Avoid saving your credit/debit card information on websites.
◦ Don’t mail back to unknown senders.
◦ Use strong passwords.
◦ Report to law enforcement agencies if you fall a victim to any cyber trap.
Cyber Laws in India
◦ The Information Technology IT act came into force on 17th October,2000.
◦ Most of the cyber-crimes covered under the IT Act are punishable with imprisonment of
3 (three) years or less. The cyber-crimes which are punishable with imprisonment of
more than 3 (three) years are:
a.publishing or transmitting obscene material in electronic form under section 67 of the IT
Act;
b.publishing or transmitting of material containing sexually explicit act, etc., in electronic
form under section 67A of the IT Act;
c.publishing or transmitting of material depicting children in sexually explicit act, etc., in
electronic form under section 67B of the IT Act; and
d.cyber terrorism under section 66F of the IT Act.
References
◦ https://en.wikipedia.org/wiki/Cybercrime
◦ https://www.mondaq.com/india/it-and-internet/891738/cyber-crimes-under-the-ipc-and-it-act--an-uneasy-co-
existence
Cyber Crime &Cyber Awareness

More Related Content

Similar to Cyber Crime &Cyber Awareness

Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Hîmãlåy Làdhä
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)Apurv Singh Gautam
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 

Similar to Cyber Crime &Cyber Awareness (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber security Cyber security
Cyber security
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Cyber Crime &Cyber Awareness

  • 1. CYBER AWARENESS Dr. Shweta Singh Assistant Professor Dept. of English KMGGPGC Badalpur
  • 2. Overview ◦ Definition of cyber crime ◦ Difference between conventional crime and cyber crime ◦ Why should we know about cyber crime? ◦ Categories of cyber crime ◦ Detailed classification of cyber crimes ◦ How to prevent cyber crime? ◦ Cyber laws in India ◦ How to approach cyber cell?
  • 3. Definition ◦ Cyber crime is a crime that involves a computer and a network. It is also known as computer crimes. ◦ While most cyber crimes are carried out to generate profit for the cyber criminals, some cyber crimes are carried out against devices directly to damage them.
  • 5. A major difference between conventional and cybercrime is length of investigations. Since cybercrime involves perpetrators using falsified names and working from remote locations, it usually takes longer to identify the real cyber criminals and apprehend them. In most cases, cyber criminals escape from arrest because the investigators cannot locate them. Conventional crimes take shorter time period to investigate because the criminals usually leave evidence that can be used to spot them.
  • 6. WHY SHOULD WE KNOW ABOUT CYBER CRIME?
  • 7. Cyber crimes in India spiked nearly nine times since 2013 ◦ India recorded 50,035 cases of cyber crime in 2020, with a 11.8% surge in such offences over the previous year, as 578 incidents of "fake news on social media" were also reported, official data showed on September 15. ◦ The rate of cyber crime (incidents per lakh population) also increased from 3.3% in 2019 to 3.7% in 2020 in the country, according to the National Crime Records Bureau (NCRB) data. ◦ Source-https://www.thehindu.com/news/national/india- reported-118-rise-in-cyber-crime-in-2020-578-incidents-of- fake-news-on-social-media-data/article36480525.ece ◦ https://www.news18.com/news/india/cyber-crimes-in- india-spiked-nearly-nine-times-since-2013-up-topped- chart-in-2020-data-4210703.html
  • 8. Categories of Cyber Crime Computer as a target Computer as a tool
  • 9. Computer as a target ◦ Computer Viruses ◦ Denial of service attacks ◦ Malware (malicious code)
  • 10. Computer Viruses ◦ A computer virus is a type of computer program that, when, executed replicates itself by modifying other computer programs and inserting its own code. ◦ I LOVE YOU- It is one of the most destructive viruses of all time. The virus came in an email with a subject line that said “ I Love You” ◦ MyDoom ◦ Crytolocker ◦ Sharing music, files, downloading free games invite such viruses. ◦ These viruses cause system failure and corrupt data.
  • 11. How to prevent computer viruses ◦ Use antivirus protection and a firewall as-McAfee, Norton, AVG etc • Always keep your antivirus protection up-to-date • Update your operating system regularly • Increase your browser security settings • Avoid questionable Websites • Only download software from sites you trust. • Carefully evaluate free software and file-sharing applications before downloading them. • Don't open messages from unknown senders
  • 12. Denial of service (DOS) attacks ◦ DOS attacks is a cyber attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily disrupting services of a host connected to a network. ◦ Web servers such as banks and credit card gateways are often target of such attacks. ◦ Prevention- Use of effective tools to block traffic that they identify as illegitimate.
  • 13. Malware ◦ Malware is any software intentionally designed to cause damage to a computer. ◦ A wide variety of malware types exist including computer viruses, worms, ransomware, spyware. ◦ Prevention- a range of antivirus software, firewalls should be used.
  • 14. Computer as a tool Phishing Spamming Identity theft & Identity Fraud Offensive content Ad Fraud Online harassment
  • 15. Phishing ◦ Phishing is a type of social engineering where an attacker sends a fraudulent (fake, deceptive) messages to trick a human victim into revealing sensitive information. ◦ Types- email phishing, voice phishing, SMS phishing ◦ Technique- link manipulation ◦ Prevention- extra caution
  • 16. Spamming ◦ Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising. ◦ Spam can be used to spread computer viruses and malicious software. ◦ Prevention- whenever you found any suspicious or unwanted emails or messages, just unsubscribe them.
  • 17. Identity Theft and identity Fraud ◦ Identity theft occurs when someone uses another person’s personal identifying information, like their name, identifying number, credit number, without their permissions to commit fraud or other crimes. ◦ Types of fraud and theft- Bank fraud, card fraud, identity document forgery ◦ Prevention- ◦ Use strong passwords ◦ Never divulge personal information data in response to an email, text or phone call unless you are certain that the request is from a bona fide source.
  • 18. Offensive Content ◦ Child Pornography ◦ The content of websites and other electronic communications may be distasteful, offensive for a variety of reasons. In some instances, these communications may be illegal. ◦ The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs.
  • 19. Ad Fraud ◦ Ad fraud is the categorical term inclusive of all forms of online advertising frauds. ◦ App install fraud ◦ Click spam
  • 20. Online harassment ◦ Cyberbullying ◦ Online predator ◦ Cyberstalking ◦ Cyber racism ◦ Internet Troll
  • 21. Organised Cyber crimes on Big scale ◦ Cyber Terrorism ◦ Cyber Extortion ◦ Cyber sex-trafficking ◦ Cyber warfare
  • 22.
  • 23. ◦ Never accept friend requests from unknown persons on social media platforms. ◦ Be cautious while sharing personal information with virtual friends whom you don’t know in real life. ◦ Never share your passwords/ credit/debit card PIN/OTP with anyone. ◦ Disable camera permission and keep the lens of your camera closed or covered when not in use. ◦ Always log out from online accounts when you are done. ◦ Never click on a link from an untrusted source. ◦ Don’t forward any rumour or message on social media platforms till your are sure about its authenticity. ◦ Avoid using free or unsecured Wi-Fi for logging into your profiles. ◦ Avoid saving your credit/debit card information on websites. ◦ Don’t mail back to unknown senders. ◦ Use strong passwords. ◦ Report to law enforcement agencies if you fall a victim to any cyber trap.
  • 24.
  • 25. Cyber Laws in India ◦ The Information Technology IT act came into force on 17th October,2000. ◦ Most of the cyber-crimes covered under the IT Act are punishable with imprisonment of 3 (three) years or less. The cyber-crimes which are punishable with imprisonment of more than 3 (three) years are: a.publishing or transmitting obscene material in electronic form under section 67 of the IT Act; b.publishing or transmitting of material containing sexually explicit act, etc., in electronic form under section 67A of the IT Act; c.publishing or transmitting of material depicting children in sexually explicit act, etc., in electronic form under section 67B of the IT Act; and d.cyber terrorism under section 66F of the IT Act.
  • 26.
  • 27.