SlideShare a Scribd company logo
Cyber Crime
• “Cyber crime” is a term used to broadly describe criminal
activity in which computers or computer networks are a
tool, a target, or a place of criminal activity and include
everything from electronic cracking to denial of service
attacks.
• Cyber crime mainly consists of unauthorized access to
computer systems data alteration, data destruction, theft of
intellectual properly. Cyber crime in the context of national
security may involve hacking, traditional espionage, or
information warfare and related activities.
Main Objectives
• To explore about cybercrime.
• To create awareness about cyber crime to the mass.
• To gain more knowledge about cyber crime.
Cyber Crime In India
• The majority of cyber crimes are centered on fraud and
phishing.
• India is the 3rd most targeted country for phishing attacks
after the us and uk.
• Social networks as well as ecommerce sites are major
targets.
• India is the no. 1 country for generating spam.
Why India?
• A rapidly growing online user base
• 121 million internet users.
• 65 million active internet users
• 50 million users shop online on economic and online
shopping sites
• 46+ million social network users.
• Huge population.
India Crime Scene
• The major cyber crimes reported in india, are denial of
services, spam computer virus, cyber stalking and phishing.
• Nearly $120 million worth of mobiles are being lost or stolen
in the country every year.
• The users have to protect information, contact details and
telephone numbers as these could be misused.
• They should not keep any document related to their bank
reports
Types Of Cyber Crime
• Sale of illegal articles weapons, wildlife, narcotics.
• Online gambling
• Cyber stalking
• Phishing
• Vulnerability
• Cyber terrorism
• Intellectual property crimes
• Cyber defamation
Cyber Crime Variants
Hacking
“ Hacking is a crime which includes cracking
systems and gaining unauthorized access to the data stored in
them.
Cyber Squatting
“ Cyber squatting is the act of registering a famous domain
name and then selling it in future. This is an issue that has
not been tackled in IT Act 2000.
Phishing
• Phishing is the just one of the many frauds on the internet
trying to fool people into parting with their money.
• Phishing refers to the receipt of unsolicited emails by
customer of financial institutions, requesting them to enter
their username password or other personal information to
access their account for some reason.
• The fraudster then has access to the customer’s online bank
account and to the funds contained in that account.
Cyber Stalking
• Cyber Stalking is use of the internet or other electronic
means to stalk someone.
• This term is used interchangeably with online harassment
and online abuse.
• Stalking generally involves harassing or threatening
behaviour that an individual engages in repeatedly.
• Such as following a person, appearing at person’s home or
place of business, making harassing phone calls, leaving
written messages or objects.
Vishing
• Vishing is the criminal practise of using social engineering
and voice over IP to gain access to private personal and
information from the public for the purpose of financial
reward.
• The term is a combination of “voice and phishing”. vishing
exploits the public’s trust in landline telephone services.
• Vishing is typically used to steal credit card numbers or other
inforrmation used in identify theft schemes from individuals.
• Trojan Horse: A Trojan as this program is called as an
unauthorized program which functions from inside what
seems to be an authorized program, thereby concealing
what it is actually doing
• Internet time theft: This connotes the usage by
unauthorized persons of the internet hours paid for by
another person
• Web Jacking: This occurs when someone forcefully takes
control of a website(By cracking the password).
• Salami Attacks: are used for the commission of financial
crimes. The key here to make the alteration so insignificant
in a single case it would go completely unnoticed e.g a bank
employee insert a program into bank’s servers that deducts
a small amount from the account of every customer.
• Click Jacking:Click jacking is a form of cyber attack where
the hacker uses an invisible layer over the embedded web
content.
Cyber laws in India
• Under the information technology act, 2000
• Whoever with the intent to cause or knowing that he is likely
to cause wrongful loss or damage to the public or any
person.
• Destroys or deletes or alter any information residing in a
computer resource or diminishes its value or affects it
injuriously by any means commits hack.
• Whoever commits hacking shall be punished with
imprisonment up to three years or with fine which may
extent up to two lakh rupees, or with both.
IT Amendment act 2008
• Section 66A: punishment for sending offensive message
through communication service ,etc
• Section 66C: Punishment for identity theft.
• Section 66D: Punishment for cheating by personation
by using computer resource
• Section 66E: Punishment for violation of privacy.
Preventions of cybercrime
• Anti virus and Anti spyware software:
• Anti virus software consists of computer programs that
attempt to identify and eliminate computer virus and other
malware software. Anti spywares are used to restrict
backdoor program.
• Firewalls:
• A firewall protects a computer network from unauthorized
access. Network firewalls may be hardware devices,
software programs or a combination of two.
Future Of Cyber crime
• Continued websites hacks.
• Data and information theft.
• Increasing phishing attacks on financial websites.
• Cybercriminals targeting social and professional networks.
• Threats directed at the mobile platform.
Computer Vulnerability
• Computer stores huge amount of data in small spaces
• Ease of access.
• Complexity of technology.
• Human error.
• Need new laws and upgraded technology to combat cyber
crimes.
Cyber Defamation
• Cyber defamation occours when defamation takes place
with the help of computers and from the internet
• Example- email containing defamation about that person by
making a false statement to another.
Crime Under IPC
SENDING THREATENING
MESSAGE BY EMAIL
SEC 503 IPC
SENDING DEFAMATORY
MESSAGE BY EMAIL
SEC 499, 500 IPC
FORGERY OF ELECTRONIC
RECORDS
SEC 463, 470, 471 IPC
CYBER FRAUDS SEC 420 IPC
Power Of Police
• SECTION 156 CR.P.C : POWER TO INVESTIGATE
COGNIZABLE OFFENCES.
• SECTION 155 CR.P.C : POWER TO INVESTIGATE NON
COGNIZABLE OFFENCES.
• SECTION 91 CR.P.C : SUMMON TO PRODUCE
DOCUMENTS
• SECTION 160 CR.P.C : SUMMON TO REQUIRE
ATTENDENCE OF WITNESSES.
Other Acts
• Stored communications Act: It is passed in 1986 is
focused on protecting the confidentiality, integrity and
availability of electronic communications that are currently
in form of electronic storage.
• Digital millennium Copyright Act: It is passed in
1998 is a united states copyright law that criminalizes the
production and dissemination of technology, devices.
Better Initiatives
• Suggested amendments to the IT act 2000-new provisions
for child pornography etc.
• More public awareness campaigns
• Training of police officers to effectively combat cyber crime.
• More cyber crime cells set up across the country.
• Websites aid in creating awareness and encouraging
reporting of cyber crime cases
• Active coordination between police and other law
enforcement agencies and authorities is required.
Conclusion
• Indian laws are well drafted and capable of handling all kind
of challenges as posed by cyber criminal, however the
enforcement agencies are required to be well reversed with
the changing technologies and laws”
• As internet technology advances so does the threat of cyber
crime. In times likes these we must protect ourselves from
cyber crime. Antivirus software, firewalls and security
patches are just the beginning. Never open suspicious emails
and only navigate to trusted sites.
Bibliography
• http://knowcybercrime121.blogspot.in
• http://www Dailybhaskar.com
• http://www.livemint.com
• http://www. ic3.gov
• http://www.rediff.com/money/report/tech-cyber-crime-
1600-arrested-only-7-convicted/20121211.html
• http://timesofindia.indiatimes.com/city/mumbai/Rs-15L-
stolen-from-account-of-businessman-in-July-bank-and-police-
yet-to-act/articleshow/22304142.cms
• http://cybertimes.in/?q=node/601

More Related Content

What's hot

Unit 1
Unit 1Unit 1
Unit 1
Jigarthacker
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Accenture
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
Onkar1431
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mazhar Nazik
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
AnandKaGe
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Krishnav Ray Baruah
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 

What's hot (20)

Unit 1
Unit 1Unit 1
Unit 1
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 

Viewers also liked

Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
Grant Thornton Bangladesh
 
Unit 2
Unit 2Unit 2
Unit 2
Jigarthacker
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Matthew Rosenquist
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
Emil Tan
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
Adv Prashant Mali
 
Hu rt
Hu rtHu rt
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
GlobalSign
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
Matthew Rosenquist
 
Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations
Case IQ
 

Viewers also liked (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Unit 2
Unit 2Unit 2
Unit 2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Hu rt
Hu rtHu rt
Hu rt
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
 
Data protection act
Data protection act Data protection act
Data protection act
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations
 

Similar to Cyber crime ppt

Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Animesh Shaw
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
Jyotisheklingji
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
Jayati Tiwari
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
Prof. Neeta Awasthy
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
OmprakashRaut
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 

Similar to Cyber crime ppt (20)

Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 

Cyber crime ppt

  • 1. Cyber Crime • “Cyber crime” is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. • Cyber crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual properly. Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities.
  • 2. Main Objectives • To explore about cybercrime. • To create awareness about cyber crime to the mass. • To gain more knowledge about cyber crime.
  • 3. Cyber Crime In India • The majority of cyber crimes are centered on fraud and phishing. • India is the 3rd most targeted country for phishing attacks after the us and uk. • Social networks as well as ecommerce sites are major targets. • India is the no. 1 country for generating spam.
  • 4. Why India? • A rapidly growing online user base • 121 million internet users. • 65 million active internet users • 50 million users shop online on economic and online shopping sites • 46+ million social network users. • Huge population.
  • 5. India Crime Scene • The major cyber crimes reported in india, are denial of services, spam computer virus, cyber stalking and phishing. • Nearly $120 million worth of mobiles are being lost or stolen in the country every year. • The users have to protect information, contact details and telephone numbers as these could be misused. • They should not keep any document related to their bank reports
  • 6. Types Of Cyber Crime • Sale of illegal articles weapons, wildlife, narcotics. • Online gambling • Cyber stalking • Phishing • Vulnerability • Cyber terrorism • Intellectual property crimes • Cyber defamation
  • 7. Cyber Crime Variants Hacking “ Hacking is a crime which includes cracking systems and gaining unauthorized access to the data stored in them. Cyber Squatting “ Cyber squatting is the act of registering a famous domain name and then selling it in future. This is an issue that has not been tackled in IT Act 2000.
  • 8. Phishing • Phishing is the just one of the many frauds on the internet trying to fool people into parting with their money. • Phishing refers to the receipt of unsolicited emails by customer of financial institutions, requesting them to enter their username password or other personal information to access their account for some reason. • The fraudster then has access to the customer’s online bank account and to the funds contained in that account.
  • 9. Cyber Stalking • Cyber Stalking is use of the internet or other electronic means to stalk someone. • This term is used interchangeably with online harassment and online abuse. • Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly. • Such as following a person, appearing at person’s home or place of business, making harassing phone calls, leaving written messages or objects.
  • 10. Vishing • Vishing is the criminal practise of using social engineering and voice over IP to gain access to private personal and information from the public for the purpose of financial reward. • The term is a combination of “voice and phishing”. vishing exploits the public’s trust in landline telephone services. • Vishing is typically used to steal credit card numbers or other inforrmation used in identify theft schemes from individuals.
  • 11. • Trojan Horse: A Trojan as this program is called as an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing • Internet time theft: This connotes the usage by unauthorized persons of the internet hours paid for by another person • Web Jacking: This occurs when someone forcefully takes control of a website(By cracking the password).
  • 12. • Salami Attacks: are used for the commission of financial crimes. The key here to make the alteration so insignificant in a single case it would go completely unnoticed e.g a bank employee insert a program into bank’s servers that deducts a small amount from the account of every customer. • Click Jacking:Click jacking is a form of cyber attack where the hacker uses an invisible layer over the embedded web content.
  • 13. Cyber laws in India • Under the information technology act, 2000 • Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person. • Destroys or deletes or alter any information residing in a computer resource or diminishes its value or affects it injuriously by any means commits hack. • Whoever commits hacking shall be punished with imprisonment up to three years or with fine which may extent up to two lakh rupees, or with both.
  • 14. IT Amendment act 2008 • Section 66A: punishment for sending offensive message through communication service ,etc • Section 66C: Punishment for identity theft. • Section 66D: Punishment for cheating by personation by using computer resource • Section 66E: Punishment for violation of privacy.
  • 15. Preventions of cybercrime • Anti virus and Anti spyware software: • Anti virus software consists of computer programs that attempt to identify and eliminate computer virus and other malware software. Anti spywares are used to restrict backdoor program. • Firewalls: • A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs or a combination of two.
  • 16. Future Of Cyber crime • Continued websites hacks. • Data and information theft. • Increasing phishing attacks on financial websites. • Cybercriminals targeting social and professional networks. • Threats directed at the mobile platform.
  • 17. Computer Vulnerability • Computer stores huge amount of data in small spaces • Ease of access. • Complexity of technology. • Human error. • Need new laws and upgraded technology to combat cyber crimes.
  • 18. Cyber Defamation • Cyber defamation occours when defamation takes place with the help of computers and from the internet • Example- email containing defamation about that person by making a false statement to another.
  • 19. Crime Under IPC SENDING THREATENING MESSAGE BY EMAIL SEC 503 IPC SENDING DEFAMATORY MESSAGE BY EMAIL SEC 499, 500 IPC FORGERY OF ELECTRONIC RECORDS SEC 463, 470, 471 IPC CYBER FRAUDS SEC 420 IPC
  • 20. Power Of Police • SECTION 156 CR.P.C : POWER TO INVESTIGATE COGNIZABLE OFFENCES. • SECTION 155 CR.P.C : POWER TO INVESTIGATE NON COGNIZABLE OFFENCES. • SECTION 91 CR.P.C : SUMMON TO PRODUCE DOCUMENTS • SECTION 160 CR.P.C : SUMMON TO REQUIRE ATTENDENCE OF WITNESSES.
  • 21. Other Acts • Stored communications Act: It is passed in 1986 is focused on protecting the confidentiality, integrity and availability of electronic communications that are currently in form of electronic storage. • Digital millennium Copyright Act: It is passed in 1998 is a united states copyright law that criminalizes the production and dissemination of technology, devices.
  • 22. Better Initiatives • Suggested amendments to the IT act 2000-new provisions for child pornography etc. • More public awareness campaigns • Training of police officers to effectively combat cyber crime. • More cyber crime cells set up across the country. • Websites aid in creating awareness and encouraging reporting of cyber crime cases • Active coordination between police and other law enforcement agencies and authorities is required.
  • 23. Conclusion • Indian laws are well drafted and capable of handling all kind of challenges as posed by cyber criminal, however the enforcement agencies are required to be well reversed with the changing technologies and laws” • As internet technology advances so does the threat of cyber crime. In times likes these we must protect ourselves from cyber crime. Antivirus software, firewalls and security patches are just the beginning. Never open suspicious emails and only navigate to trusted sites.
  • 24. Bibliography • http://knowcybercrime121.blogspot.in • http://www Dailybhaskar.com • http://www.livemint.com • http://www. ic3.gov • http://www.rediff.com/money/report/tech-cyber-crime- 1600-arrested-only-7-convicted/20121211.html • http://timesofindia.indiatimes.com/city/mumbai/Rs-15L- stolen-from-account-of-businessman-in-July-bank-and-police- yet-to-act/articleshow/22304142.cms • http://cybertimes.in/?q=node/601