content explained:-
what is cyber crime
history
categories
types
motives
safety tips
cyber security
advantages and disadvantages
cyber law
cyber law objectives
cyber law in india
conclusion
Content:
What is phishing, history, how it works, statistics, types of phishing, how to identify it, how to take countermeasures, phishing kit, example of phishing attack.
Learn about the different types of Phishing Attacks; like Content-Injection, and MiTM attack, that can target you and your organization.
To know more about phishing prevention, read our in-depth article "How to Prevent a Phishing Attack? 17 Easy Hacks for Administrators"
https://blog.syscloud.com/phishing-attack/
The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is cyber crime- illegal activity committed on the internet.
There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
Content:
What is phishing, history, how it works, statistics, types of phishing, how to identify it, how to take countermeasures, phishing kit, example of phishing attack.
Learn about the different types of Phishing Attacks; like Content-Injection, and MiTM attack, that can target you and your organization.
To know more about phishing prevention, read our in-depth article "How to Prevent a Phishing Attack? 17 Easy Hacks for Administrators"
https://blog.syscloud.com/phishing-attack/
The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is cyber crime- illegal activity committed on the internet.
There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
Cyber crime is an activity done using computers and internet.
Cyber forensics is the science of collecting, examining, analyzing and reporting electronic evidence.
CYBER CRIME - A Threat To Internet UsersAman Sharma
the presentation include a description of what cyber crime is and what are the different methods of cyber crimes. in further slides it tells about the punishment for the cyber criminals and various methods to stop or reduce the chances of cyber crime.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2. CONTENT
1. What is Cyber Crime
2. History of Cyber Crime
3. Categories of Cyber Crime
4. Types of Cyber Crime
5. Motives of Cyber Criminals
6. Safety tips for Cyber Crime6. Safety tips for Cyber Crime
7. Cyber Security
8. Advantages of Cyber Security
9. Disadvantages of Cyber Security
10. Cyber Law
11. Objectives of Cyber Law
12. Cyber Law in India
13. Conclusion
3. WHAT IS CYBER CRIME
Cybercrime is a crime that involves a computer and a
network. It is also known as computer-oriented crime.
Cybercrime can be defined as a crime in which a computer is
the object of crime (hacking, phishing, spamming) or is usedthe object of crime (hacking, phishing, spamming) or is used
as a tool to commit an offense (child pornography, hate
crimes).
Cybercriminals may use computer technology to access
personal information, business trade secrets or use the
internet for exploitation trade secrets or use the internet for
exploitative or malicious purposes.
4. HISTORY OF CYBER CRIME
The first cyber crime ever recorded was in France
during 1820
The person involved was Joseph- Marie. He was a
textile manufacturer and he invented looms that can
store design.store design.
The first spam email took place in the year 1978
when it was sent out over the Arpanet.
The first virus was installed on Apple Computer in
the year 1982 when a high school student ‘Rich
Skrenta’ developed the EIK Cloner.
A sixteen years old student nicknamed ‘data stream’,
arrested by UK police in 1994
5. India is the third-most targeted country for Phishing
attacks after the US and the UK.
Social networks as well as ecommerce sites are major
targets.
India is the number one country in the world for generating
spams.
Denial of Service (DOS) attacks by ‘Mafia Boy’ on eBay, Denial of Service (DOS) attacks by ‘Mafia Boy’ on eBay,
Yahoo, and other popular sites in 2000.
FBI’s email system was hacked in February, 2005.
Travelling documents of NATO forces were hacked in
Afghanistan.
6. CATEGORIES OF CYBER CRIME
Cyber crime
Against Person Against Property Against Government
Cyber crimes against persons :- Crimes that happen in
the Cyber space against persons include various crimes
such as transmission of child-pornography, cyber
harassment, cyber stalking, cyber bullying, cyber
defamation, revenge porn, email spoofing, cracking,
carding, sms spoofing, pornography, credit card frauds,
online libel / slander, cyber smearing, trafficking,
financial frauds, identity theft, etc.
7. Cyber crimes against property :- Cyber crimes
against property includes computer vandalism,
IPR violations, cyber squatting, typo squatting,
cyber trespass, DDOS attacks, worm attacks,
hacking, transmitting viruses, intellectual
property theft, infringement, etc.
Cyber crimes against government :- Cyber crimes Cyber crimes against government :- Cyber crimes
against government are serious in nature as it is
considered as an act of war against the
Sovereignty. Cyber crimes such as cyber
terrorism, cyber warfare, pirated software,
possessing of unauthorized information, hacking
into confidential military data are some of the
real dangers that Governments face these days.
9. 1. Cyberextortion :- It is a form of online crime which occurs
when a person uses the internet to demand money or
other goods or behaviour (such as sex), from another
person by threatening to inflict harm to his person, his
reputation, or his property.
2. Cryptojacking :- Its is an emerging form of malware that
hides on your device and steals its computing resources inhides on your device and steals its computing resources in
order to min for valuable online currencies like Bit coin.
3. Identity theft :- Identity theft is the act of a person
obtaining information illegally about someone else. Thief's
try to find such information as full name, maiden name,
address, date of birth, social security number, password,
email, credit card number etc.
10. 4. Credit card fraud :- An attack that occurs when hacker
secretly gain access on retailer’s systems to get the credit
card or banking information of their customers and after
that attacker uses that credit card to purchase something
of high value.
5. Cyber Espionage :- A crime involving a cybercriminals
who hacks into systems or networks to gain access to
confidential information held by a government or otherconfidential information held by a government or other
organization. It can be done to gather data or destroy data
or to access over CCTV cameras.
6. Software piracy :- An attack that involves the unlawful
copying, distribution and use of software programs with
the intention of commercial or personal use. Trademark
violations, copyright infringements and patent violations
are often associated with this type of cybercrime.
11. 7. Exit scam :- The dark web has given rise to the digital
version of an old crime known as the exit scam. Dark web
administrators divert virtual currency held in
marketplace into their own accounts.
8. Phishing :- The fraudulent practice of sending emails
purporting to be from reputable companies in order to
induce individual to reveal personal information, such asinduce individual to reveal personal information, such as
passwords and credit card numbers.
9. Malware :- Malware is a program or file that is harmful to
a computer viruses, Trojan horses and spyware. These
malicious program can perform a variety of different
functions such as stealing, deleting sensitive data,
encrypting or monitoring users activity.
12. MOTIVES OF CYBER CRIMINALS
Profit Revenge
Desire for
entertainment
Profit
Political
agenda
Psychiatric
illness
Sexual
motivations
Revenge
Motives of
Cyber Criminals
13. SAFETY TIPS FOR CYBER CRIME
Use antivirus software's
Insert firewall
Uninstall unnecessary software
Maintain backup Maintain backup
Check security settings
Never give your full name or address to strangers
Learn more about internet privacy
Avoid clicking on unnecessary advertisement
Keep your system updated for latest security version.
14. CYBER SECURITY
Cyber security refers to set of rules and regulation which are
used for protecting the network, data and program from
malicious attack. The core functionality of cyber security
includes to protect the system and data from various cyber
threats or cyber security crimes. Cyber security is the practicethreats or cyber security crimes. Cyber security is the practice
of protecting system, program and network from various
types of network attacks.
There are various forms of cyber threats such as malware,
malicious application, phishing and exploit kits. These types
of cyber security attacks are usually aimed at accessing,
destroying and altering the sensitive data of the user
15. ADVANTAGES OF CYBER SECURITY
Some advantages of cyber security are as follows :-
It provides protection against worms, viruses, spyware
and other unwanted programs.
It provides protection from data theft as with the It provides protection from data theft as with the
implementation high-security protocol malicious user
cannot break the network architecture.
Protect the system from hacking.
Provide data and system privacy. This can be achieved
with the good implementation of security policies and
protocols in the network.
16. DISADVANTAGES OF CYBER
SECURITY
Some disadvantages of cyber security are as follows :-
Rules of the firewall are difficult to configure correctly.
Makes the system week or sometime too much security Makes the system week or sometime too much security
can backfire
It is costly for the average
Incorrect firewalls rules block the user from accessing
various services of the network.
17. CYBER LAWS
Cyber law is a term that encapsulates the legal issues related
to use of the internet. It is also known as Internet law.
It Is less a distinct field of law than intellectual property or
contract law, as its domain covering many areas of law and
regulation.
Some leading topics include internet access and usage, privacy,
freedom of expression, and jurisdiction.
In simple words, cyber law can be considered as a part of the
overall legal system that deals with the Internet, E-commerce,
digital contracts, electronics evidence, cyberspace, and their
respective legal issues.
18. OBJECTIVES OF CYBER LAW
The aim and objectives of the Cyber Law are as follows :-
To create more awareness about cyber legal issues and
challenges
To provide advice, inputs as also guidance to people on To provide advice, inputs as also guidance to people on
their day-to-day legal issues concerning the use of
cyberspace
To work on research and development on cutting-edge
issues and challenges in cyberspace
To contribute to the global debate on evolving Cyber law
jurisprudence
According to Cyber Law, any company can store their data
in electronic storage.
19. To coordinate with other concerned stakeholders in the
digital environment so as to contribute to the evolving Cyber
law jurisprudence
To provide legal assistance and advice to people, who have
been affected by misuse of cyberspace and connected
services
To stop computer crime and protect privacy of internet
users.users.
To provide facility of filling document online relating to
school admission or registration in employment exchange.
To give legal recognition to digital signature for accepting
any agreement via computer.
To make more power to IPO, RBI and Indian Evidence act
for restricting electronic crime.
20. CYBER LAWS IN INDIA
India has enacted the first I.T. Act, 2000 based on the
UNCIRAL model recommended by the general
assembly of the United Nations.
Offences under IT acts are:
Tampering with computer source document Tampering with computer source document
Hacking with computer systems, data alterations
Publishing obscene information
Un-authorized access to protected systems
Breach of confidentiality and privacy
Publishing false digital signature certificates
21. CONCLUSION
By exercising common sense and following security best
practices, users can protect against phishing attacks, Ransom
ware, malware, identity theft, scams, and some of the other
most common types of cyber crime.
But as we all know, nothing is stagnant on the web.
Cybercrime is continually evolving, which is whyCybercrime is continually evolving, which is why
organizations must continually train their employees and
help them build upon their awareness of IT security threats.
DONT CLICK ON
UNWANTED SITES
AND
ADVERTISMENTS