Cyber crime is a growing problem in India. Some common cyber crimes reported in India include phishing, hacking of government websites, and identity theft. India ranks 11th globally for reported cyber crimes, which are increasing due to factors like rapid growth of internet users. Common cyber crimes involve unauthorized access to systems, data theft and alteration, and using computers to enable other illicit activities. While laws like the IT Act 2000 have been enacted to tackle cyber crimes, enforcement remains a challenge as only a small percentage of crimes are reported. Techniques like antivirus software, firewalls, and educating users can help address the problem.
Here i had uploaded PPt on cyber crime in india : current scenario and survey. The data which was included was from the google data and survey up to the year 2021 .
Here i had uploaded PPt on cyber crime in india : current scenario and survey. The data which was included was from the google data and survey up to the year 2021 .
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is cyber crime- illegal activity committed on the internet.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is cyber crime- illegal activity committed on the internet.
WATCH THE VIDEO HERE: https://vimeo.com/63437853
We're being inundated with more information than ever before.
With the rise of all this information, we're being exposed to a tremendous amount of bullshit.
We have to decide if we want to contribute to the noise or if we want to be part of the signal.
These are the slides from my Creative Mornings talk in Pittsburgh, PA.
Cyber pornograpghy (with special reference to child pornography)gunpreet kamboj
containing all provisions of Indian Penal Code & IT act 2000 related to pornography & child pornography. Prepared by Gunpreet kaur kamboj, law student of GNDU (asr) . if u like it then please like it or comment it...as i did alot of hardwork
2013-12-06 Digital Forensics and Child PornographyFrederick Lane
This is a presentation I gave to the DE Association of Criminal Defense Lawyers on December 6, 2013. Main themes include: Digital Technology and Child Pornography, Digital Investigations, Introduction to Computer Forensics, and Defending Child Pornography Cases.
Cyber Crime can involve criminal activities, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the IPC. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.
Cyber crime a potential threat and remediesIJARIIT
Cybercrime is an illegal activity performed by an individual or by a group of experts in computer technology using
the Internet. It ranges from stealing money online from an individual to big corporate using the internet. In the present era of
information technology, the computer has made the life easy. People use computer or mobile to perform various jobs on the
Internet. So it is necessary to know how to perform various transactions on the internet safely. Everyone is prone to the attack
from the cyber criminals. One must be aware and should have knowledge of cybercrime.
CYBER CRIME - A Threat To Internet UsersAman Sharma
the presentation include a description of what cyber crime is and what are the different methods of cyber crimes. in further slides it tells about the punishment for the cyber criminals and various methods to stop or reduce the chances of cyber crime.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
3. Crimes are not to be measured by the issue of
events, but by the bad intensions of men.
The greatest crimes do not arise from a want of
feeling for others but from an over sensibility for
ourselves and an over indulgence in our own
desires.
Monday, September 24, 2012
4. CYBER CRIME !!
The expression ‘Crime’ is defined as an act, which subjects the doer to
legal punishment or any offence against morality, social order or any
unjust or shameful act. The “Offence" is defined in the Code of
Criminal Procedure to mean as an act or omission made punishable by
any law for the time being in force.
Cyber Crime is emerging as a serious threat. World wide
governments, police departments and intelligence units have started
to react.
Monday, September 24, 2012
5. Cyber Crime is a term used to broadly describe criminal activity in which computers
or computer networks are a tool, a target, or a place of criminal activity and include
everything from electronic cracking to denial of service attacks. It is also used to
include traditional crimes in which computers or networks are used to enable the
illicit activity.
Computer crime mainly consists of unauthorized access to computer systems data
alteration, data destruction, theft of intellectual property. Cyber crime in the context
of national security may involve hacking, traditional espionage, or information
warfare and related activities.
Pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment,
Defamation, Spam and Phishing are some examples where computers are used to
commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy and
Hacking are examples where computers become target of crime.
Monday, September 24, 2012
6. Indian Crime Scene
The major Cyber Crimes reported, in
India, are Denial of Services, Defacement of
Websites, Spam, Computer Virus and Worms,
Pornography, Cyber Squatting, Cyber Stalking
and Phishing.
Given the fact that nearly $ 120 million
worth of Mobiles are being lost or stolen in the
country every year, the users have to protect
Information, Contact details and Telephone
numbers as these could be misused. Nearly 69
per cent of information theft is carried out by
current and ex-employees and 31 per cent by
hackers. India has to go a long way in protecting
the vital information.
[3 The Hindu, Saturday, Oct 27, 2007].
Monday, September 24, 2012
7. Cyber Crime Variants
Hacking
"Hacking" is a crime, which entails cracking
systems and gaining unauthorized access to the
data stored in them. Hacking had witnessed a 37
per cent increase this year.
Cyber Squatting
Cyber Squatting is the act of registering a famous
Domain Name and then selling it for a fortune.
This is an issue that has not been tackled in
IT ACT 2000.
Monday, September 24, 2012
8. Phishing is just one of the many frauds on
the Internet, trying to fool people into
parting with their money. Phishing refers to
the receipt of unsolicited emails by
customers of Financial Institutions,
requesting them to enter their Username,
Password or other personal information to
access their Account for some reason.
The fraudster then has access to the
customer's online bank account and to the
funds contained in that account.
Monday, September 24, 2012
9. Cyber Stalking is use of the Internet or other
electronic means to stalk someone. This
term is used interchangeably with online
harassment and online abuse. Stalking
generally involves harassing or threatening
behaviour that an individual engages in
repeatedly, such as following a person,
appearing at a person's home or place of
business, making harassing phone calls,
leaving written messages or objects, or
vandalizing a person's property.
Monday, September 24, 2012
10. VISHING
Vishing is the criminal practice of using
social engineering and Voice over IP
(VoIP) to gain access to private personal
and financial information from the
public for the purpose of financial
reward. The term is a combination of
“Voice" and phishing. Vishing exploits
the public's trust in landline telephone
services.
Vishing is typically used to steal credit
card numbers or other information used
in identity theft schemes from
Monday, September 24, 2012 individuals.
11. India stands 11th in the ranking for Cyber Crime in
the World, constituting 3% of the Global Cyber
Monday, September 24, 2012
Crime.
12. Why India?
A rapidly growing online user
base
121 Million Internet Users
65 Million Active Internet Users,
up by 28% from 51 million in
2010
50 Million users shop online on
Ecommerce and Online
Shopping Sites
46+ Million Social Network
Users
346 million mobile users had
subscribed to Data Packages.
Monday, September 24, 2012
Source: IAMAI; Juxt; wearesocial 2011
13. Cyber Crime In
India
The majority of cybercrimes are centered on forgery, fraud and
Phishing,
India is the third-most targeted country for Phishing attacks
after the US and the UK,
Social networks as well as ecommerce sites are major targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010,
6,850 .in and 4,150 .com domains were defaced during 2011,
15,000 sites hacked in 2011,
India is the number 1 country in the world for generating spam.
Monday, September 24, 2012
14. Cost Of Cyber Crime In India (2010)
29.9 million people fell victim to cybercrime,
$4 billion in direct financial losses,
$3.6 billion in time spent resolving the crime,
4 in 5 online adults (80%) have been a victim of
Cybercrime,
17% of adults online have experienced cybercrime
on their mobile phone.
Source: Norton Cybercrime Report 2011
Monday, September 24, 2012
15. We have covered about three instances where high-profile government websites were
hacked and defaced. However, the actual number of Government Websites that were
hacked are quite huge.
A total number of 90, 119, 252 and 219 Government websites tracked by the Indian
Computer Emergency Response Team (CERT-In) were hacked / defaced by various
hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively.
Monday, September 24, 2012
16. Again, this is
growing trend and
it is surprising that
authorities have
not taken stern
actions to curb the
growth of these
cyber-crimes.
The police have recorded 3,038 cases but made only 2,700
arrests in 3 years (between 2007 and 2010)
India registered only 1,350 cases under the IT Act and IPC in
2010
50% of cybercrimes are not even reported.
Monday, September 24, 2012
17. Cyber Laws in India
Under The Information
Technology Act, 2000
CHAPTER XI – OFFENCES – 66. Hacking with
computer system.
(1) Whoever with the Intent to cause or knowing
that he is likely to cause Wrongful Loss or
Damage to the public or any person Destroys or
Deletes or Alters any Information Residing in a
Computer Resource or diminishes its value or
utility or affects it injuriously by any means,
commits hack.
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine which may extend up to two lakh rupees, or with both.
Monday, September 24, 2012
18. Whoever without permission of
the owner of the computer :
Secures Access;
Downloads, Copies or extracts
any data, computer database or
any information;
Introduce or causes to be introduce
any Virus or Contaminant;
Disrupts or causes disruption;
Denies or causes denial of access to any person;
Provides any assistance to any person to facilitate access
Charges the services availed of by a person to the account of
another person by Tampering with or Manipulating any Computer,
Computer System, or Computer Network;
Shall be liable to pay damages by way of compensation not exceeding one
crore rupees to the person so affected.
Monday, September 24, 2012
19. Information Technology Amendment Act,
2008
Section – 43,
Destroys, Deletes or Alters any Information residing in a computer resource or
diminishes its value or utility or affects it injuriously by any means;
Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy
or alter any computer source code used for a computer resource with an intention
to cause damage;
“If any person, dishonestly, or fraudulently, does any act referred to in section 43,
he shall be punishable with imprisonment for a term which may extend to two
three years or with fine which may extend to five lakh rupees or with both.” [S.66]
Monday, September 24, 2012
20. S .66A - P u n i s h me n tf or s e ndi ng
o f f e n s i v e me s s a g e s t h r o u g h
c o mmu n i c a t i o n s e r v i c e , e t c
A n y p e r s o n w h o s e n d s , b y me a n s o f a
c o mp u t e r r e s o u r c e o r a
c o mmu n i c a t i o n d e v i c e ;
A n y i n f o r ma t i o n t h a t i s g r o s s l y
o f f e n s i v e o r h a s me n a c i n g
c ha r a c t e r ; or
An y i n f o r ma t i o n w h i c h h e k n o w s t o
be f a l s e , but f or t he pur pos e of
c a us i ng a nnoy a nc e , i nc onv e ni e nc e ,
da nge r , obs t r uc t i on , i ns ul t ,
i n j u r y , c r i mi n a l i n t i mi d a t i o n ,
e n mi t y , h a t r e d , o r i l l w i l l ,
pe r s i s t e n t l y ma k e s b y ma k i n g u s e
of s u c h c o mp u t e r r e s o u r c e o r a
c o mmu n i c a t i o n d e v i c e ;
A n y e l e c t r o n i c ma i l o r e l e c t r o n i c
Monday, September m 2012 s a g e
m a i l 24, e s f or t he pur pos e of
c a us i ng a nnoy a nc e or
21. S. 66C - Punishment for identity theft
“Whoever, fraudulently or dishonestly make use of the
electronic signature, password or any other unique identification
feature of any other person, shall be punished with imprisonment
of either description for a term which may extend to three years
and shall also be liable to fine which may extend to rupees one
lakh”
S. 66D - Punishment for cheating by personation by using
computer resource
“Whoever, by means of any communication device or
computer resource cheats by personation, shall be punished with
imprisonment of either description for a term which may extend
to three years and shall also be liable to fine which may extend to
one lakh rupees. “
Monday, September 24, 2012
22. S . 66E - P u n i s h m e n t f o r
v i ol a t i on of pr i v a c y .
“Wh o e v e r , i n t e n t i o n a l l y o r
k n o wi n g l y c a p t u r e s , p u b l i s h e s o r
t r a n s mi t s t h e i ma g e o f a p r i v a t e
a r e a o f a n y p e r s o n wi t h o u t h i s o r
h e r c o n s e n t , u n d e r c i r c u ms t a n c e s
v i o l a t i ng t he pr i v a c y of t ha t
p e r s o n , s h a l l b e p u n i s h e d wi t h
i mp r i s o n me n t w h i c h ma y e x t e n d t o
t hr e e y e a r s o r wi t h f i n e n o t
e x c e e d i n g t wo l a k h r u p e e s , o r wi t h
b ot h”
S . 67 A - P u n i s h me n t f or
publ i s hi ng or t r a ns mi t t i n g
o f ma t e r i a l c o n t a i n i ng
sMonday,x u a 24, 2012 y e x p l i c i t a
e September l l c t , e t c . i n
23. S. 67 C - Preservation and Retention of information
by intermediaries.
“(1) Intermediary shall preserve and retain such
information as may be specified for such duration and
in such manner and format as the Central Government
may prescribe.
(2) Any intermediary who intentionally or knowingly
contravenes the provisions of sub section (1) shall be
punished with an imprisonment for a term which may
extend to three years and shall also be liable to fine.”
Monday, September 24, 2012
24. Arrests & Reports Under IT Act
Under the IT Act, 966 cybercrime
cases were filed in 2010
420 in 2009)
Geographic breakdown of cases
reported:
o 153 from Karnataka,
o 148 from Kerala
o 142 from Maharashtra
o 105 Andhra Pradesh
o 52 Rajasthan
o 52 Punjab
233 persons were arrested in 2010
33% of the cases registered were
related to hacking
Source: National Crime Records Bureau
Monday, September 24, 2012
25. Arrests & Reports Under IPC
Under the IPC, 356 cybercrime cases were registered in
2010 (276 cases in 2009)
Geographic breakdown of cases reported --
o 104 from Maharashtra
o 66 Andhra Pradesh
o 46 Chhattisgarh
The majority of these crimes were
either forgery or fraud cases.
Source: National Crime Records Bureau
Monday, September 24, 2012
26. How to Tackle Such Activities?
An important question arises that how can these crimes be prevented. A
number of techniques and solutions have been presented but the problems still
exists and are increasing day by day.
Antivirus And Anti Spyware Software:
Аntivirus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software. Anti spy
wares are used to restrict backdoor program, trojans and other spy wares to be
installed on the computer.
Firewalls:
A firewall protects a computer network from unauthorized access. Network
firewalls may be hardware devices, software programs, or a combination of the
two. A network firewall typically guards an internal computer network against
malicious access from outside the network.
Monday, September 24, 2012
27. Cr y p t o g r a p h y :
Cr y pt ogr a phy i s t he s c i e nc e of
e n c r y pt i ng a nd de c r y pt i ng
i n f o r ma t i o n . E n c r y p t i o n i s l i k e
s e n d i n g a p o s t a l ma i l t o a n o t h e r
pa r t y wi t h a l o c k c o d e o n t h e
e n v e l o p e wh i c h i s k n o wn o n l y t o
t h e s e nde r a nd t he r e c i pi e nt . A
nu mb e r o f c r y p t o g r a p h i c me t h o d s
ha v e b e e n d e v e l o p e d a n d s o me o f
t h e m a r e s t i l l not c r a c k e d.
Cy b e r E t h i c s a n d L a ws :
Cy b e r e t h i c s a n d c y b e r l a ws a r e
a l s o be i ng f or mu l a t e d t o s t o p
c y b e r c r i me s . I t i s a
r e s pons i bi l i t y of e v e r y
i ndi v i dua l t o f ol l ow c y be r e t hi c s
Monday, September 24, 2012
a n d c y b e r l a ws s o t ha t t he
28. The Future of Cyber-Crimes in India
• Continued Website Hacks and
Defacements
• Data and Information theft
• Increasing phishing attacks on
Ecommerce and Financial Websites
• Cybercriminals targeting Social and
Professional Networks
• Threats directed at the Mobile Platform:
Smartphones and Tablets
Monday, September 24, 2012
29. Conclusion…
“Indian Laws are well drafted and are capable of handling all kinds of
challenges as posed by cyber criminals. However, the enforcement
agencies are required to be well versed with the changing technologies
and Laws.”
"As internet technology advances so does the threat of cyber crime.
In times like these we must protect ourselves from cyber crime. Anti-
virus software, firewalls and security patches are just the beginning.
Never open suspicious e-mails and only navigate to trusted sites.”
Monday, September 24, 2012