SlideShare a Scribd company logo
1 of 17
1
© AIR LAW ACADEMY & RESEARCH CENTRE,
NAGPUR
Cyber crime
Cyber
Stalking
Cyber
Contraband
Cyber
trespassing
Cyber
laundering
Cyber
Vandalism
Cyber
Slandering
Cyber Theft
Cyber Porn
Cyber
Terrorism
Cyber
Fraud
2© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Misuse of Computer Technology.
 Any crime in which the Computer system or
Technology used as a Tool or Weapon to commit
a crime.
3© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
1. Cyber Fraud 6. Cyber Theft
1. Cyber Trespassing 7. Cyber Pornography
1. Cyber Laundering 8. Cyber Stalking
1. Cyber Terrorism 9. Cyber Slandering
1. Cyber Vandalism 10. Cyber Contraband
4© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Wrong doings
 It includes Financial Fraud.
Example: In U.S one of the top most nationalized bank had
his interest calculation programme malfunctioning i.e. from
every account Indian Rs. 2/- were being taken & deposited
in the account of an unknown person in the bank. Since the
bank had almost 20 lakh account holders taking Indian Rs.
2/- from each account meant that Rs. 40 lakh were
transferred to an unknown account.
5© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 In this type of crime the victim is followed
online by the accused through Computer system.
 Distinguished emails are sent to the victim who
unknowingly downloads the mails into the
machine, not knowing that the email containing
attachment will later work as a spy program to
send the details of the victim to the accused.
6© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 In this type of crime, emails are sent to the
victim making them believe that they have won
lottery or some million dollars, receiving emails
by the victims that their ancestral property is
deposited in some certain bank etc.
 These emails ask for the personal details of the
victim such as name, address, occupation, bank
account number, passport details etc.
7© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Misuse of technology to commit any terrorist
activity.
 In the internet world terrorist use code word
such as Honey for selling & buying of guns,
weapons etc.
 Around 50,000 websites promote terrorism.
8© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Spoiling individual's/ country’s/ organization’s
image.
 Sites such as Orkut, Face book etc are mostly used
for Vandalism.
For e.g. in a recent case a girls profile was tarnished
on a famous social network site “Orkut”. On further
investigation by the police it was revealed that the
profile was put by the victims best friend.
9© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
The reason for tarnishing the image was that
both girls were in love with the same boy and
therefore to break up her relationship the girl’s
best friend did it, such that the boy could
develop a negative attitude towards the girl and
therefore she will get to marry that boy. Similar
circumstances in Vandalism took place when
Maharashtra Supreme patriot “ Shivaji
Maharaja” image was tarnished on Orkut
10© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Stealing internet time
 Unauthorized sharing of USB Modem/Data
11© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Publishing the information or broadcasting website which
is lascivious in nature.
 Pornography MMS.
Example: A boy who had pocked nose, to take revenge
from his friend and teacher fabricated the original
photograph with some unwarranted porno image and
published it on the website. On further investigation by
the police it was found the photograph was a morphed
one. It is assumed that there are 42 lakh website which
promote pornography through out the world.
12© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Includes chatting crimes, threatening E-mails
recording of the chat in unauthorized manner.
13© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Giving wrong information while registering a
website.
14© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Buying and selling of illegal on internet.
 Smuggling
15© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Awareness is the first step in protecting yourself,
your family and your business.
 Use antivirus software’s
 Insert Firewalls
 Uninstall unnecessary software
 Maintain backup
 Check security setting
 Stay anonymous –Choose a genderless screen name
 Never give your full name or address to strangers
16© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
17
THANK YOU

More Related Content

What's hot (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 

Viewers also liked

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Integrating technology ppt
Integrating technology pptIntegrating technology ppt
Integrating technology pptalowry3
 
partner with the world leader - Anytime Fitness Franchise
partner with the world leader - Anytime Fitness Franchisepartner with the world leader - Anytime Fitness Franchise
partner with the world leader - Anytime Fitness FranchiseAnytime Fitness India
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHIApoorva Billore
 
66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMIApoorva Billore
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyKunal Agrawal
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber CrimeNithin Raj
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Information technology act
Information technology actInformation technology act
Information technology actMeghana Bhogle
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAWpattok
 

Viewers also liked (20)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Integrating technology ppt
Integrating technology pptIntegrating technology ppt
Integrating technology ppt
 
partner with the world leader - Anytime Fitness Franchise
partner with the world leader - Anytime Fitness Franchisepartner with the world leader - Anytime Fitness Franchise
partner with the world leader - Anytime Fitness Franchise
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI
 
66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Li fi technology ppt
Li fi technology pptLi fi technology ppt
Li fi technology ppt
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
Vts ppt( new)
Vts ppt( new)Vts ppt( new)
Vts ppt( new)
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
I P S P O O F I N G
I P  S P O O F I N GI P  S P O O F I N G
I P S P O O F I N G
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Information technology act
Information technology actInformation technology act
Information technology act
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 

Similar to Cyber crime ppt new

Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcRay Brannon
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptxangellaclarianes1
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 

Similar to Cyber crime ppt new (20)

Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Godfather 2.0
Godfather 2.0Godfather 2.0
Godfather 2.0
 
IPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptxIPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptx
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 

Recently uploaded

一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理ss
 
OVERVIEW OF LABOUR LAWS with Case Studies- ppt.ppt
OVERVIEW OF LABOUR LAWS with Case Studies- ppt.pptOVERVIEW OF LABOUR LAWS with Case Studies- ppt.ppt
OVERVIEW OF LABOUR LAWS with Case Studies- ppt.pptRRR Chambers
 
Jim Eiberger Rental Agreement Redacted Former Lease.docx
Jim Eiberger Rental Agreement Redacted Former Lease.docxJim Eiberger Rental Agreement Redacted Former Lease.docx
Jim Eiberger Rental Agreement Redacted Former Lease.docxDenver CO
 
Sanctions and types of Sanctions in Ibnternational law along with its scope a...
Sanctions and types of Sanctions in Ibnternational law along with its scope a...Sanctions and types of Sanctions in Ibnternational law along with its scope a...
Sanctions and types of Sanctions in Ibnternational law along with its scope a...uttamuditi
 
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxMUKUL TYAGI
 
Dematerialisation of securities of private companies
Dematerialisation of securities of private companiesDematerialisation of securities of private companies
Dematerialisation of securities of private companiesSS Industries
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理F La
 
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptxJudgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptxSuneelSONU1
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxIshikaChauhan30
 
The Main Procedures for a Divorce in Greece
The Main Procedures for a Divorce in GreeceThe Main Procedures for a Divorce in Greece
The Main Procedures for a Divorce in GreeceBridgeWest.eu
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样mefyqyn
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...Sehrish Saba
 
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...Oranecornish
 
Assignment of Law of crime.pptx including crpc
Assignment of Law of crime.pptx including crpcAssignment of Law of crime.pptx including crpc
Assignment of Law of crime.pptx including crpcKhushbooChoubey1
 
Petitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docxPetitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docxRumantSharma
 
Democratic Awareness with Legal Literacy POLS 303.pptx
Democratic Awareness with Legal Literacy POLS 303.pptxDemocratic Awareness with Legal Literacy POLS 303.pptx
Democratic Awareness with Legal Literacy POLS 303.pptxNarenderSharma219732
 

Recently uploaded (20)

一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
OVERVIEW OF LABOUR LAWS with Case Studies- ppt.ppt
OVERVIEW OF LABOUR LAWS with Case Studies- ppt.pptOVERVIEW OF LABOUR LAWS with Case Studies- ppt.ppt
OVERVIEW OF LABOUR LAWS with Case Studies- ppt.ppt
 
Jim Eiberger Rental Agreement Redacted Former Lease.docx
Jim Eiberger Rental Agreement Redacted Former Lease.docxJim Eiberger Rental Agreement Redacted Former Lease.docx
Jim Eiberger Rental Agreement Redacted Former Lease.docx
 
Sanctions and types of Sanctions in Ibnternational law along with its scope a...
Sanctions and types of Sanctions in Ibnternational law along with its scope a...Sanctions and types of Sanctions in Ibnternational law along with its scope a...
Sanctions and types of Sanctions in Ibnternational law along with its scope a...
 
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
 
Dematerialisation of securities of private companies
Dematerialisation of securities of private companiesDematerialisation of securities of private companies
Dematerialisation of securities of private companies
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptxJudgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptx
 
The Main Procedures for a Divorce in Greece
The Main Procedures for a Divorce in GreeceThe Main Procedures for a Divorce in Greece
The Main Procedures for a Divorce in Greece
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
 
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...
 
Assignment of Law of crime.pptx including crpc
Assignment of Law of crime.pptx including crpcAssignment of Law of crime.pptx including crpc
Assignment of Law of crime.pptx including crpc
 
Petitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docxPetitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docx
 
Democratic Awareness with Legal Literacy POLS 303.pptx
Democratic Awareness with Legal Literacy POLS 303.pptxDemocratic Awareness with Legal Literacy POLS 303.pptx
Democratic Awareness with Legal Literacy POLS 303.pptx
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 

Cyber crime ppt new

  • 1. 1 © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 3.  Misuse of Computer Technology.  Any crime in which the Computer system or Technology used as a Tool or Weapon to commit a crime. 3© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 4. 1. Cyber Fraud 6. Cyber Theft 1. Cyber Trespassing 7. Cyber Pornography 1. Cyber Laundering 8. Cyber Stalking 1. Cyber Terrorism 9. Cyber Slandering 1. Cyber Vandalism 10. Cyber Contraband 4© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 5.  Wrong doings  It includes Financial Fraud. Example: In U.S one of the top most nationalized bank had his interest calculation programme malfunctioning i.e. from every account Indian Rs. 2/- were being taken & deposited in the account of an unknown person in the bank. Since the bank had almost 20 lakh account holders taking Indian Rs. 2/- from each account meant that Rs. 40 lakh were transferred to an unknown account. 5© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 6.  In this type of crime the victim is followed online by the accused through Computer system.  Distinguished emails are sent to the victim who unknowingly downloads the mails into the machine, not knowing that the email containing attachment will later work as a spy program to send the details of the victim to the accused. 6© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 7.  In this type of crime, emails are sent to the victim making them believe that they have won lottery or some million dollars, receiving emails by the victims that their ancestral property is deposited in some certain bank etc.  These emails ask for the personal details of the victim such as name, address, occupation, bank account number, passport details etc. 7© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 8.  Misuse of technology to commit any terrorist activity.  In the internet world terrorist use code word such as Honey for selling & buying of guns, weapons etc.  Around 50,000 websites promote terrorism. 8© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 9.  Spoiling individual's/ country’s/ organization’s image.  Sites such as Orkut, Face book etc are mostly used for Vandalism. For e.g. in a recent case a girls profile was tarnished on a famous social network site “Orkut”. On further investigation by the police it was revealed that the profile was put by the victims best friend. 9© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 10. The reason for tarnishing the image was that both girls were in love with the same boy and therefore to break up her relationship the girl’s best friend did it, such that the boy could develop a negative attitude towards the girl and therefore she will get to marry that boy. Similar circumstances in Vandalism took place when Maharashtra Supreme patriot “ Shivaji Maharaja” image was tarnished on Orkut 10© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 11.  Stealing internet time  Unauthorized sharing of USB Modem/Data 11© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 12.  Publishing the information or broadcasting website which is lascivious in nature.  Pornography MMS. Example: A boy who had pocked nose, to take revenge from his friend and teacher fabricated the original photograph with some unwarranted porno image and published it on the website. On further investigation by the police it was found the photograph was a morphed one. It is assumed that there are 42 lakh website which promote pornography through out the world. 12© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 13.  Includes chatting crimes, threatening E-mails recording of the chat in unauthorized manner. 13© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 14.  Giving wrong information while registering a website. 14© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 15.  Buying and selling of illegal on internet.  Smuggling 15© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 16.  Awareness is the first step in protecting yourself, your family and your business.  Use antivirus software’s  Insert Firewalls  Uninstall unnecessary software  Maintain backup  Check security setting  Stay anonymous –Choose a genderless screen name  Never give your full name or address to strangers 16© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 17. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 17 THANK YOU