SlideShare a Scribd company logo
CYBER CRIME
Presentation on
Submitted to :-
Mrs. Kritika Pahuja
Submitted By :-
Neeraj Kumar Ahirwar
MBA FT (5 YEARS) VI SEM
Roll no. 1967
CONTENT
1. What is Cyber Crime
2. History of Cyber Crime
3. Categories of Cyber Crime
4. Types of Cyber Crime
5. Motives of Cyber Criminals
6. Safety tips for Cyber Crime6. Safety tips for Cyber Crime
7. Cyber Security
8. Advantages of Cyber Security
9. Disadvantages of Cyber Security
10. Cyber Law
11. Objectives of Cyber Law
12. Cyber Law in India
13. Conclusion
WHAT IS CYBER CRIME
Cybercrime is a crime that involves a computer and a
network. It is also known as computer-oriented crime.
Cybercrime can be defined as a crime in which a computer is
the object of crime (hacking, phishing, spamming) or is usedthe object of crime (hacking, phishing, spamming) or is used
as a tool to commit an offense (child pornography, hate
crimes).
Cybercriminals may use computer technology to access
personal information, business trade secrets or use the
internet for exploitation trade secrets or use the internet for
exploitative or malicious purposes.
HISTORY OF CYBER CRIME
 The first cyber crime ever recorded was in France
during 1820
 The person involved was Joseph- Marie. He was a
textile manufacturer and he invented looms that can
store design.store design.
 The first spam email took place in the year 1978
when it was sent out over the Arpanet.
 The first virus was installed on Apple Computer in
the year 1982 when a high school student ‘Rich
Skrenta’ developed the EIK Cloner.
 A sixteen years old student nicknamed ‘data stream’,
arrested by UK police in 1994
 India is the third-most targeted country for Phishing
attacks after the US and the UK.
 Social networks as well as ecommerce sites are major
targets.
 India is the number one country in the world for generating
spams.
 Denial of Service (DOS) attacks by ‘Mafia Boy’ on eBay, Denial of Service (DOS) attacks by ‘Mafia Boy’ on eBay,
Yahoo, and other popular sites in 2000.
 FBI’s email system was hacked in February, 2005.
 Travelling documents of NATO forces were hacked in
Afghanistan.
CATEGORIES OF CYBER CRIME
Cyber crime
Against Person Against Property Against Government
 Cyber crimes against persons :- Crimes that happen in
the Cyber space against persons include various crimes
such as transmission of child-pornography, cyber
harassment, cyber stalking, cyber bullying, cyber
defamation, revenge porn, email spoofing, cracking,
carding, sms spoofing, pornography, credit card frauds,
online libel / slander, cyber smearing, trafficking,
financial frauds, identity theft, etc.
 Cyber crimes against property :- Cyber crimes
against property includes computer vandalism,
IPR violations, cyber squatting, typo squatting,
cyber trespass, DDOS attacks, worm attacks,
hacking, transmitting viruses, intellectual
property theft, infringement, etc.
 Cyber crimes against government :- Cyber crimes Cyber crimes against government :- Cyber crimes
against government are serious in nature as it is
considered as an act of war against the
Sovereignty. Cyber crimes such as cyber
terrorism, cyber warfare, pirated software,
possessing of unauthorized information, hacking
into confidential military data are some of the
real dangers that Governments face these days.
Cyberextortion
Cryptojacking
Identity theft
TYPES OF CYBER CRIME
Credit card fraud
Cyber Espionage
Software piracy
Exit scam
Phishing
Malware
1. Cyberextortion :- It is a form of online crime which occurs
when a person uses the internet to demand money or
other goods or behaviour (such as sex), from another
person by threatening to inflict harm to his person, his
reputation, or his property.
2. Cryptojacking :- Its is an emerging form of malware that
hides on your device and steals its computing resources inhides on your device and steals its computing resources in
order to min for valuable online currencies like Bit coin.
3. Identity theft :- Identity theft is the act of a person
obtaining information illegally about someone else. Thief's
try to find such information as full name, maiden name,
address, date of birth, social security number, password,
email, credit card number etc.
4. Credit card fraud :- An attack that occurs when hacker
secretly gain access on retailer’s systems to get the credit
card or banking information of their customers and after
that attacker uses that credit card to purchase something
of high value.
5. Cyber Espionage :- A crime involving a cybercriminals
who hacks into systems or networks to gain access to
confidential information held by a government or otherconfidential information held by a government or other
organization. It can be done to gather data or destroy data
or to access over CCTV cameras.
6. Software piracy :- An attack that involves the unlawful
copying, distribution and use of software programs with
the intention of commercial or personal use. Trademark
violations, copyright infringements and patent violations
are often associated with this type of cybercrime.
7. Exit scam :- The dark web has given rise to the digital
version of an old crime known as the exit scam. Dark web
administrators divert virtual currency held in
marketplace into their own accounts.
8. Phishing :- The fraudulent practice of sending emails
purporting to be from reputable companies in order to
induce individual to reveal personal information, such asinduce individual to reveal personal information, such as
passwords and credit card numbers.
9. Malware :- Malware is a program or file that is harmful to
a computer viruses, Trojan horses and spyware. These
malicious program can perform a variety of different
functions such as stealing, deleting sensitive data,
encrypting or monitoring users activity.
MOTIVES OF CYBER CRIMINALS
Profit Revenge
Desire for
entertainment
Profit
Political
agenda
Psychiatric
illness
Sexual
motivations
Revenge
Motives of
Cyber Criminals
SAFETY TIPS FOR CYBER CRIME
 Use antivirus software's
 Insert firewall
 Uninstall unnecessary software
 Maintain backup Maintain backup
 Check security settings
 Never give your full name or address to strangers
 Learn more about internet privacy
 Avoid clicking on unnecessary advertisement
 Keep your system updated for latest security version.
CYBER SECURITY
Cyber security refers to set of rules and regulation which are
used for protecting the network, data and program from
malicious attack. The core functionality of cyber security
includes to protect the system and data from various cyber
threats or cyber security crimes. Cyber security is the practicethreats or cyber security crimes. Cyber security is the practice
of protecting system, program and network from various
types of network attacks.
There are various forms of cyber threats such as malware,
malicious application, phishing and exploit kits. These types
of cyber security attacks are usually aimed at accessing,
destroying and altering the sensitive data of the user
ADVANTAGES OF CYBER SECURITY
Some advantages of cyber security are as follows :-
 It provides protection against worms, viruses, spyware
and other unwanted programs.
 It provides protection from data theft as with the It provides protection from data theft as with the
implementation high-security protocol malicious user
cannot break the network architecture.
 Protect the system from hacking.
 Provide data and system privacy. This can be achieved
with the good implementation of security policies and
protocols in the network.
DISADVANTAGES OF CYBER
SECURITY
Some disadvantages of cyber security are as follows :-
 Rules of the firewall are difficult to configure correctly.
 Makes the system week or sometime too much security Makes the system week or sometime too much security
can backfire
 It is costly for the average
 Incorrect firewalls rules block the user from accessing
various services of the network.
CYBER LAWS
Cyber law is a term that encapsulates the legal issues related
to use of the internet. It is also known as Internet law.
It Is less a distinct field of law than intellectual property or
contract law, as its domain covering many areas of law and
regulation.
Some leading topics include internet access and usage, privacy,
freedom of expression, and jurisdiction.
In simple words, cyber law can be considered as a part of the
overall legal system that deals with the Internet, E-commerce,
digital contracts, electronics evidence, cyberspace, and their
respective legal issues.
OBJECTIVES OF CYBER LAW
The aim and objectives of the Cyber Law are as follows :-
 To create more awareness about cyber legal issues and
challenges
 To provide advice, inputs as also guidance to people on To provide advice, inputs as also guidance to people on
their day-to-day legal issues concerning the use of
cyberspace
 To work on research and development on cutting-edge
issues and challenges in cyberspace
 To contribute to the global debate on evolving Cyber law
jurisprudence
 According to Cyber Law, any company can store their data
in electronic storage.
 To coordinate with other concerned stakeholders in the
digital environment so as to contribute to the evolving Cyber
law jurisprudence
 To provide legal assistance and advice to people, who have
been affected by misuse of cyberspace and connected
services
 To stop computer crime and protect privacy of internet
users.users.
 To provide facility of filling document online relating to
school admission or registration in employment exchange.
 To give legal recognition to digital signature for accepting
any agreement via computer.
 To make more power to IPO, RBI and Indian Evidence act
for restricting electronic crime.
CYBER LAWS IN INDIA
 India has enacted the first I.T. Act, 2000 based on the
UNCIRAL model recommended by the general
assembly of the United Nations.
 Offences under IT acts are:
Tampering with computer source document Tampering with computer source document
 Hacking with computer systems, data alterations
 Publishing obscene information
 Un-authorized access to protected systems
 Breach of confidentiality and privacy
 Publishing false digital signature certificates
CONCLUSION
By exercising common sense and following security best
practices, users can protect against phishing attacks, Ransom
ware, malware, identity theft, scams, and some of the other
most common types of cyber crime.
But as we all know, nothing is stagnant on the web.
Cybercrime is continually evolving, which is whyCybercrime is continually evolving, which is why
organizations must continually train their employees and
help them build upon their awareness of IT security threats.
DONT CLICK ON
UNWANTED SITES
AND
ADVERTISMENTS
THANK
Y UY U

More Related Content

What's hot

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Darshan Vithani
 
Cyber crime
Cyber crimeCyber crime
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Phishing
PhishingPhishing
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
ishmecse13
 
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Krishnav Ray Baruah
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
FCA - Future Chartered Accountants
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
Pratham Jaiswal
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing
PhishingPhishing
Phishing
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 

Similar to Cyber Crime and Security ppt by Neeraj Ahirwar

Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
PrinceKumar851167
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
Hussain777
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
silas Sargunam
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
TanviModi14
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
Anjana Ks
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
Vicky Shah
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
VivekanandaGN1
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
sunanditaAnand
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
CUInnovationTeam
 

Similar to Cyber Crime and Security ppt by Neeraj Ahirwar (20)

Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

Cyber Crime and Security ppt by Neeraj Ahirwar

  • 1. CYBER CRIME Presentation on Submitted to :- Mrs. Kritika Pahuja Submitted By :- Neeraj Kumar Ahirwar MBA FT (5 YEARS) VI SEM Roll no. 1967
  • 2. CONTENT 1. What is Cyber Crime 2. History of Cyber Crime 3. Categories of Cyber Crime 4. Types of Cyber Crime 5. Motives of Cyber Criminals 6. Safety tips for Cyber Crime6. Safety tips for Cyber Crime 7. Cyber Security 8. Advantages of Cyber Security 9. Disadvantages of Cyber Security 10. Cyber Law 11. Objectives of Cyber Law 12. Cyber Law in India 13. Conclusion
  • 3. WHAT IS CYBER CRIME Cybercrime is a crime that involves a computer and a network. It is also known as computer-oriented crime. Cybercrime can be defined as a crime in which a computer is the object of crime (hacking, phishing, spamming) or is usedthe object of crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitation trade secrets or use the internet for exploitative or malicious purposes.
  • 4. HISTORY OF CYBER CRIME  The first cyber crime ever recorded was in France during 1820  The person involved was Joseph- Marie. He was a textile manufacturer and he invented looms that can store design.store design.  The first spam email took place in the year 1978 when it was sent out over the Arpanet.  The first virus was installed on Apple Computer in the year 1982 when a high school student ‘Rich Skrenta’ developed the EIK Cloner.  A sixteen years old student nicknamed ‘data stream’, arrested by UK police in 1994
  • 5.  India is the third-most targeted country for Phishing attacks after the US and the UK.  Social networks as well as ecommerce sites are major targets.  India is the number one country in the world for generating spams.  Denial of Service (DOS) attacks by ‘Mafia Boy’ on eBay, Denial of Service (DOS) attacks by ‘Mafia Boy’ on eBay, Yahoo, and other popular sites in 2000.  FBI’s email system was hacked in February, 2005.  Travelling documents of NATO forces were hacked in Afghanistan.
  • 6. CATEGORIES OF CYBER CRIME Cyber crime Against Person Against Property Against Government  Cyber crimes against persons :- Crimes that happen in the Cyber space against persons include various crimes such as transmission of child-pornography, cyber harassment, cyber stalking, cyber bullying, cyber defamation, revenge porn, email spoofing, cracking, carding, sms spoofing, pornography, credit card frauds, online libel / slander, cyber smearing, trafficking, financial frauds, identity theft, etc.
  • 7.  Cyber crimes against property :- Cyber crimes against property includes computer vandalism, IPR violations, cyber squatting, typo squatting, cyber trespass, DDOS attacks, worm attacks, hacking, transmitting viruses, intellectual property theft, infringement, etc.  Cyber crimes against government :- Cyber crimes Cyber crimes against government :- Cyber crimes against government are serious in nature as it is considered as an act of war against the Sovereignty. Cyber crimes such as cyber terrorism, cyber warfare, pirated software, possessing of unauthorized information, hacking into confidential military data are some of the real dangers that Governments face these days.
  • 8. Cyberextortion Cryptojacking Identity theft TYPES OF CYBER CRIME Credit card fraud Cyber Espionage Software piracy Exit scam Phishing Malware
  • 9. 1. Cyberextortion :- It is a form of online crime which occurs when a person uses the internet to demand money or other goods or behaviour (such as sex), from another person by threatening to inflict harm to his person, his reputation, or his property. 2. Cryptojacking :- Its is an emerging form of malware that hides on your device and steals its computing resources inhides on your device and steals its computing resources in order to min for valuable online currencies like Bit coin. 3. Identity theft :- Identity theft is the act of a person obtaining information illegally about someone else. Thief's try to find such information as full name, maiden name, address, date of birth, social security number, password, email, credit card number etc.
  • 10. 4. Credit card fraud :- An attack that occurs when hacker secretly gain access on retailer’s systems to get the credit card or banking information of their customers and after that attacker uses that credit card to purchase something of high value. 5. Cyber Espionage :- A crime involving a cybercriminals who hacks into systems or networks to gain access to confidential information held by a government or otherconfidential information held by a government or other organization. It can be done to gather data or destroy data or to access over CCTV cameras. 6. Software piracy :- An attack that involves the unlawful copying, distribution and use of software programs with the intention of commercial or personal use. Trademark violations, copyright infringements and patent violations are often associated with this type of cybercrime.
  • 11. 7. Exit scam :- The dark web has given rise to the digital version of an old crime known as the exit scam. Dark web administrators divert virtual currency held in marketplace into their own accounts. 8. Phishing :- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individual to reveal personal information, such asinduce individual to reveal personal information, such as passwords and credit card numbers. 9. Malware :- Malware is a program or file that is harmful to a computer viruses, Trojan horses and spyware. These malicious program can perform a variety of different functions such as stealing, deleting sensitive data, encrypting or monitoring users activity.
  • 12. MOTIVES OF CYBER CRIMINALS Profit Revenge Desire for entertainment Profit Political agenda Psychiatric illness Sexual motivations Revenge Motives of Cyber Criminals
  • 13. SAFETY TIPS FOR CYBER CRIME  Use antivirus software's  Insert firewall  Uninstall unnecessary software  Maintain backup Maintain backup  Check security settings  Never give your full name or address to strangers  Learn more about internet privacy  Avoid clicking on unnecessary advertisement  Keep your system updated for latest security version.
  • 14. CYBER SECURITY Cyber security refers to set of rules and regulation which are used for protecting the network, data and program from malicious attack. The core functionality of cyber security includes to protect the system and data from various cyber threats or cyber security crimes. Cyber security is the practicethreats or cyber security crimes. Cyber security is the practice of protecting system, program and network from various types of network attacks. There are various forms of cyber threats such as malware, malicious application, phishing and exploit kits. These types of cyber security attacks are usually aimed at accessing, destroying and altering the sensitive data of the user
  • 15. ADVANTAGES OF CYBER SECURITY Some advantages of cyber security are as follows :-  It provides protection against worms, viruses, spyware and other unwanted programs.  It provides protection from data theft as with the It provides protection from data theft as with the implementation high-security protocol malicious user cannot break the network architecture.  Protect the system from hacking.  Provide data and system privacy. This can be achieved with the good implementation of security policies and protocols in the network.
  • 16. DISADVANTAGES OF CYBER SECURITY Some disadvantages of cyber security are as follows :-  Rules of the firewall are difficult to configure correctly.  Makes the system week or sometime too much security Makes the system week or sometime too much security can backfire  It is costly for the average  Incorrect firewalls rules block the user from accessing various services of the network.
  • 17. CYBER LAWS Cyber law is a term that encapsulates the legal issues related to use of the internet. It is also known as Internet law. It Is less a distinct field of law than intellectual property or contract law, as its domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression, and jurisdiction. In simple words, cyber law can be considered as a part of the overall legal system that deals with the Internet, E-commerce, digital contracts, electronics evidence, cyberspace, and their respective legal issues.
  • 18. OBJECTIVES OF CYBER LAW The aim and objectives of the Cyber Law are as follows :-  To create more awareness about cyber legal issues and challenges  To provide advice, inputs as also guidance to people on To provide advice, inputs as also guidance to people on their day-to-day legal issues concerning the use of cyberspace  To work on research and development on cutting-edge issues and challenges in cyberspace  To contribute to the global debate on evolving Cyber law jurisprudence  According to Cyber Law, any company can store their data in electronic storage.
  • 19.  To coordinate with other concerned stakeholders in the digital environment so as to contribute to the evolving Cyber law jurisprudence  To provide legal assistance and advice to people, who have been affected by misuse of cyberspace and connected services  To stop computer crime and protect privacy of internet users.users.  To provide facility of filling document online relating to school admission or registration in employment exchange.  To give legal recognition to digital signature for accepting any agreement via computer.  To make more power to IPO, RBI and Indian Evidence act for restricting electronic crime.
  • 20. CYBER LAWS IN INDIA  India has enacted the first I.T. Act, 2000 based on the UNCIRAL model recommended by the general assembly of the United Nations.  Offences under IT acts are: Tampering with computer source document Tampering with computer source document  Hacking with computer systems, data alterations  Publishing obscene information  Un-authorized access to protected systems  Breach of confidentiality and privacy  Publishing false digital signature certificates
  • 21. CONCLUSION By exercising common sense and following security best practices, users can protect against phishing attacks, Ransom ware, malware, identity theft, scams, and some of the other most common types of cyber crime. But as we all know, nothing is stagnant on the web. Cybercrime is continually evolving, which is whyCybercrime is continually evolving, which is why organizations must continually train their employees and help them build upon their awareness of IT security threats. DONT CLICK ON UNWANTED SITES AND ADVERTISMENTS