SlideShare a Scribd company logo
CYBER
CRIME
SESSION 1
AGENDA
 What is Cyber Crime?
 CIA triad
 Cyber crimes using Mobile
 Cyber crime with computer and internet
 Hacking
 identity theft
 Cyber Stalking
 Cyber Defamation
 Pornography
 Other Important Cyber Crimes
 Phishing
 Email Spoofing
 Cyber Piracy
 Cyber Terrorism
 Cyber Terrorism
 Government Power to Intercept
 Online Cheating & Lottery Scam
 Cyber warfare
Sunday, August 6, 2017
Suresh Kumar K
WHAT IS CYBER
CRIME?
Cyber crime, or computer related crime, is crime that involves a
computer and a network. The computer may have been used in
the commission of a crime, or it may be the target.
Or
Offences that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm, or loss,
to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including
but not limited to Chat rooms, emails, notice boards and groups)
and mobile phones (Bluetooth/SMS/MMS)"
Sunday, August 6, 2017
Suresh Kumar K
Sunday, August 6, 2017
Suresh Kumar K
A report (sponsored by McAfee) estimates
that the annual damage to the global
economy is at $445 billion
In 2016, a study by Juniper Research
estimated that the costs of cybercrime
could be as high as 2.1 trillion by 2019.
China
USA
India
Netherlands
Taiwan
Symantec Corps
Sunday, August 6, 2017
Suresh Kumar K
Crime in India – 2015(http://ncrb.gov.in/)
CIA TRIAD
Security
Confidentiality
AvailabilityIntegrity
Sunday, August 6, 2017
Suresh Kumar K
CYBER CRIMES USING MOBILE
Cyber bullying
Sexting
Privacy violation
Malware
Mobile cyber stalking
Sunday, August 6, 2017
Suresh Kumar K
Your Information Is Your Asset
 Tangible
 Intangible assets
SAN BERNARDINO ATTACK
Sunday, August 6, 2017
Suresh Kumar K
CYBER CRIME WITH COMPUTER
AND INTERNET
Sunday, August 6, 2017
Suresh Kumar K
HACKING
Unauthorized access of Computer, Computer Resources,
Computer Network, Telecommunication Devices,
Telecommunication Media, etc. with an intention to take the
control over the information stored in it or transmitting through the
Cyber Space
Section 65 & 66 of IT Act
Sunday, August 6, 2017
Suresh Kumar K
IDENTITY THEFT
Whoever, fraudulently or dishonestly make use of the electronic
signature, password or any other unique identification feature of
any other person
Section 66C of IT Act
Sunday, August 6, 2017
Suresh Kumar K
CYBER STALKING
Cyber Stalking is generally considered as use of the Internet, e-
mail or other electronic communications device to stalk or harass
a person. A person following another especially women and
continuously harassing through online
Section 66 of IT Act
Sunday, August 6, 2017
Suresh Kumar K
CYBER DEFAMATION
Publishing statements lowering the reputation of persons. When
someone publishes defamatory matter about someone on a
website or sends e-mails, pictures, etc. containing defamatory
information to all of that person's friends or on the internet.
66A of IT Act
Sunday, August 6, 2017
Suresh Kumar K
PORNOGRAPHY
Section 67A of IT Act
Sunday, August 6, 2017
Suresh Kumar K
OTHER IMPORTANT CYBER
CRIMES
Sunday, August 6, 2017
Suresh Kumar K
PHISHING
phishing is a fraudulent attempt, usually made through emails, SMS,
phone calls, etc. to seeking your personal information. Criminal sends
false links and creates a “mirror” website that looks like a legitimate
website for trapping this crime. The fake website will fool people and
taking into the criminal’s site and collect your valuable information like
your user name and password.
Sec 420, 464 IPC & Sec 66 D of IT Act
Sunday, August 6, 2017
Suresh Kumar K
EMAIL SPOOFING
E-mail spoofing is the forgery of an e-mail header so that the
message appears to have originated from someone or somewhere
other than the actual source. A spoofed email is one that appears to
originate from one source but actually has been sent from another
source.
Section 66 D of IT Act
Sunday, August 6, 2017
Suresh Kumar K
https://emkei.cz/
CYBER PIRACY
Cyber Piracy is defined as art of making illegal copies of Music,
Movies, Videos, Books, software etc. for the purpose of sale
Sunday, August 6, 2017
Suresh Kumar K
CYBER TERRORISM
Whoever uses cyberspace with intent to threaten the unity,
integrity, security or sovereignty of India or to strike terror in the
people. Punishment - Imprisonment which may extent to life
imprisonment
Sec 66 F of IT Act
Sunday, August 6, 2017
Suresh Kumar K
GOVERNMENT POWER
TO INTERCEPT
Government to intercept, monitor or decrypt any information
generated through any computer resource if it thinks to do so in
the interest of the sovereignty or integrity of India.
Section 69 of IT Act
Sunday, August 6, 2017
Suresh Kumar K
Pakistan govt website
hacked, Indian national
anthem posted
ONLINE CHEATING &
LOTTERY SCAM
Sending group Emails, SMS, etc to people in the form of lottery
prize distribution, Job offers, Charity work, etc. People are
advised to not respond with these SMS or Email and inform the
police, if it is disturbing you. Don’t reply to this SMS or Emails and
don’t share any personal information and money with them.
Sunday, August 6, 2017
Suresh Kumar K
CYBER WARFARE
 Denial of service attack
 (http://map.norsecorp.com/#/)
 Stuxnet
 Zero Days Documentary 2016
Sunday, August 6, 2017
Suresh Kumar K
MALWARE
 Virus :
• Melisa virus
 Worm :
• I Love You Virus
 Botnet :
• 2007 Strom
Sunday, August 6, 2017
Suresh Kumar K
 Trojan :
• Spyware
 Ransomware:
• Wannacry
• Petya
social engineering
You are the shield
ANY QUESTION ?
Sunday, August 6, 2017
Suresh Kumar K
THANK YOU
Sunday, August 6, 2017
Suresh Kumar K

More Related Content

Similar to Cyber crime in india

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
Aman Bhargava
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
Rahul Bharati
 
Information Technology Act - Offences edited.pdf
Information Technology Act - Offences edited.pdfInformation Technology Act - Offences edited.pdf
Information Technology Act - Offences edited.pdf
SrideviAyaluri1
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
Vaibhav's Group
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI
Apoorva Billore
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
DINESH KAMBLE
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
Rahul Bharati
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
15998595.ppt
15998595.ppt15998595.ppt
15998595.ppt
MrVMNair
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and Opportunities
Jayakumar PP
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
Adv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
Adv Prashant Mali
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Adv Prashant Mali
 

Similar to Cyber crime in india (13)

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Information Technology Act - Offences edited.pdf
Information Technology Act - Offences edited.pdfInformation Technology Act - Offences edited.pdf
Information Technology Act - Offences edited.pdf
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
15998595.ppt
15998595.ppt15998595.ppt
15998595.ppt
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and Opportunities
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 

Recently uploaded

Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 

Cyber crime in india

  • 2. AGENDA  What is Cyber Crime?  CIA triad  Cyber crimes using Mobile  Cyber crime with computer and internet  Hacking  identity theft  Cyber Stalking  Cyber Defamation  Pornography  Other Important Cyber Crimes  Phishing  Email Spoofing  Cyber Piracy  Cyber Terrorism  Cyber Terrorism  Government Power to Intercept  Online Cheating & Lottery Scam  Cyber warfare Sunday, August 6, 2017 Suresh Kumar K
  • 3. WHAT IS CYBER CRIME? Cyber crime, or computer related crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Or Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including but not limited to Chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)" Sunday, August 6, 2017 Suresh Kumar K
  • 4. Sunday, August 6, 2017 Suresh Kumar K A report (sponsored by McAfee) estimates that the annual damage to the global economy is at $445 billion In 2016, a study by Juniper Research estimated that the costs of cybercrime could be as high as 2.1 trillion by 2019. China USA India Netherlands Taiwan Symantec Corps
  • 5. Sunday, August 6, 2017 Suresh Kumar K Crime in India – 2015(http://ncrb.gov.in/)
  • 7. CYBER CRIMES USING MOBILE Cyber bullying Sexting Privacy violation Malware Mobile cyber stalking Sunday, August 6, 2017 Suresh Kumar K Your Information Is Your Asset  Tangible  Intangible assets
  • 8. SAN BERNARDINO ATTACK Sunday, August 6, 2017 Suresh Kumar K
  • 9. CYBER CRIME WITH COMPUTER AND INTERNET Sunday, August 6, 2017 Suresh Kumar K
  • 10. HACKING Unauthorized access of Computer, Computer Resources, Computer Network, Telecommunication Devices, Telecommunication Media, etc. with an intention to take the control over the information stored in it or transmitting through the Cyber Space Section 65 & 66 of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 11. IDENTITY THEFT Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person Section 66C of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 12. CYBER STALKING Cyber Stalking is generally considered as use of the Internet, e- mail or other electronic communications device to stalk or harass a person. A person following another especially women and continuously harassing through online Section 66 of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 13. CYBER DEFAMATION Publishing statements lowering the reputation of persons. When someone publishes defamatory matter about someone on a website or sends e-mails, pictures, etc. containing defamatory information to all of that person's friends or on the internet. 66A of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 14. PORNOGRAPHY Section 67A of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 15. OTHER IMPORTANT CYBER CRIMES Sunday, August 6, 2017 Suresh Kumar K
  • 16. PHISHING phishing is a fraudulent attempt, usually made through emails, SMS, phone calls, etc. to seeking your personal information. Criminal sends false links and creates a “mirror” website that looks like a legitimate website for trapping this crime. The fake website will fool people and taking into the criminal’s site and collect your valuable information like your user name and password. Sec 420, 464 IPC & Sec 66 D of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 17. EMAIL SPOOFING E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. A spoofed email is one that appears to originate from one source but actually has been sent from another source. Section 66 D of IT Act Sunday, August 6, 2017 Suresh Kumar K https://emkei.cz/
  • 18. CYBER PIRACY Cyber Piracy is defined as art of making illegal copies of Music, Movies, Videos, Books, software etc. for the purpose of sale Sunday, August 6, 2017 Suresh Kumar K
  • 19. CYBER TERRORISM Whoever uses cyberspace with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people. Punishment - Imprisonment which may extent to life imprisonment Sec 66 F of IT Act Sunday, August 6, 2017 Suresh Kumar K
  • 20. GOVERNMENT POWER TO INTERCEPT Government to intercept, monitor or decrypt any information generated through any computer resource if it thinks to do so in the interest of the sovereignty or integrity of India. Section 69 of IT Act Sunday, August 6, 2017 Suresh Kumar K Pakistan govt website hacked, Indian national anthem posted
  • 21. ONLINE CHEATING & LOTTERY SCAM Sending group Emails, SMS, etc to people in the form of lottery prize distribution, Job offers, Charity work, etc. People are advised to not respond with these SMS or Email and inform the police, if it is disturbing you. Don’t reply to this SMS or Emails and don’t share any personal information and money with them. Sunday, August 6, 2017 Suresh Kumar K
  • 22. CYBER WARFARE  Denial of service attack  (http://map.norsecorp.com/#/)  Stuxnet  Zero Days Documentary 2016 Sunday, August 6, 2017 Suresh Kumar K
  • 23. MALWARE  Virus : • Melisa virus  Worm : • I Love You Virus  Botnet : • 2007 Strom Sunday, August 6, 2017 Suresh Kumar K  Trojan : • Spyware  Ransomware: • Wannacry • Petya social engineering You are the shield
  • 24. ANY QUESTION ? Sunday, August 6, 2017 Suresh Kumar K
  • 25. THANK YOU Sunday, August 6, 2017 Suresh Kumar K