SlideShare a Scribd company logo
Cyber crime-Social Media &
Family
An Indian Perspective
CYBER LAWS
To combat the crimes related to internet
The Information Technology Act, 2000 was
enacted with prime objective to create an
enabling environment for commercial use
of I.T. The IT Act specifies the acts which
have been made punishable. The Indian
Penal Code, 1860 has also been amended
to take into its purview cyber crimes.
Cyber crimes under the IT Act :
.
Hacking with Computer systems, Data
alteration - Sec.66
Publishing obscene information - Sec.67
Un Authorised access to protected system
Sec.70 Breach of Confidentiality and
Privacy - Sec.72
Sending threatening messages by email -
Sec 503 IPC
Sending defamatory messages by email -
Sec 499 IPC
Forgery of electronic records - Sec 463 IPC
Bogus websites, cyber frauds - Sec 420 IPC
Email spoofing - Sec 463 IPC
Web-Jacking - Sec. 383 IPC
E-Mail Abuse - Sec.500 IPC
What is a cyber crime ?
.
criminal activities carried out
by means of computers or the
Internet
What is a social media ?
.
websites and applications that enable users to
create and share content or to participate in
social networking.
Types of Cyber crimes
Unauthorised access
Hijacking: Pornography: Theft:
Cyber Stalking: Identity Theft:
Malicious Software
Child soliciting and Abuse:
Types of Cyber crimes
Denial of service-
Virus attack-Phishing
spoofing-defamation-Int.time theft
breach of privacy-E commerce
frauds
.
Unauthorised Access
.
.
Unauthorized access means any kind of
access without the permission of either
of the rightful or person in charge of the
computer, computer system or
computer network.
Web Hijacking:
.
.Web hijacking means taking
forceful control of another
person’s website. In this case
the owner of the website loses
control over his website and its
content
Pornography:
Pornography means showing sexual acts in
order to cause sexual excitement. The
definition of pornography also includes
pornographic websites, pornographic
magazines produced using computer and
the internet pornography delivered over
mobile phones.
Child Pornography:
.
There is an easy access to the pornographic
contents on the internet. Pedophiles lure the
children by distributing pornographic material
and then they try to meet them for sex or to
take their nude photographs including their
engagement in sexual positions. Sometimes
Pedophiles contact children in the chat rooms
posing as teenagers or a child of similar age
and then they start becoming friendlier with
them and win their confidence
:
.
Child Pornography:
How do they operate?
Pedophiles use false identity to trap the
children/teenagers
Pedophiles contact children/teens in
various chat rooms which are used by
children/teen to interact with other
children/teen.
Befriend the child/teen.
Extract personal information from the
child/teen by winning his confidence.
:
.
Cyber stalking:
. Cyber Stalking means repeated
acts of harassment or threatening
behavior of the cyber criminal
towards the victim by using
internet services. Both kind of
Stalkers i.e., Online & Offline –
have desire to control the victims
life.
How do Cyber Stalkers operate?
:They collect all personal information about the victim
such as name, family background, Telephone Numbers
of residence and work place, daily routine of the
victim, address of residence and place of work, date of
birth etc. If the stalker is one of the acquaintances of
the victim he can easily get this information. If stalker
is a stranger to victim, he collects the information from
the internet resources such as various profiles, the
victim may have filled in while opening the chat or e-
mail account or while signing an account with some
website..
.
Denial of service Attack:
:
This is an attack in which the criminal floods the
bandwidth of the victim’s network or fills his e-mail
box with spam mail depriving him of the services he is
entitled to access or provide. This kind of attack is
designed to bring the network to crash by flooding it
with useless traffic. Another variation to a typical
denial of service attack is known as a Distributed
Denial of Service (DDoS) attack wherein the
perpetrators are many and are geographically
widespread.
.
Virus attacks:
:Viruses usually affect the data on a
computer, either by altering or
deleting it. On the other hand
worms merely make functional
copies of themselves and do this
repeatedly till they eat up all the
available.
.
Phishing :
Phishing is the act of sending an e-mail to a user falsely
claiming to be an established legitimate enterprise in an
attempt to scam the user into surrendering private
information that will be used for identity theft. The e-mail
directs the user to visit a web site where they are asked to
update personal information, such as passwords and credit
card, social security, and bank account numbers that the
legitimate organization already has. The Web site, however,
is bogus and set up only to steal the user’s information. By
spamming large groups of people, the phisher counted on
the e-mail being read by a percentage of people who
actually had listed credit card numbers with legitimately
.
Email spoofing :
Email spoofing refers to email
that appears to originate from
one source but actually has
been sent from another source.
Email spoofing can also cause
monetary damage.
.
.
Cyber Defamation:
When a person publishes
defamatory matter about someone
on a website or sends e-mails
containing defamatory information
to all of that person’s friends, it is
termed as cyber defamation.
.
.
Internet time theft :
Internet time refers to usage
by an unauthorized person of
the Internet hours paid for by
another person.
.
.
Breach of Privacy and
Confidentiality :
Privacy refers to the right of an individual/s to determine
when, how and to what extent his or her personal data will
be shared with others. Breach of privacy means
unauthorized use or distribution or disclosure of personal
information.
Confidentiality means non disclosure of information to
unauthorized or unwanted persons. In addition to Personal
information some other type of information which useful
for business and leakage of such information to other
persons may cause damage to business or person, such
information should be protected.
.
.
E-commerce/ Investment Frauds:
An offering that uses false or fraudulent claims to solicit
investments or loans, or that provides for the purchase, use,
or trade of forged or counterfeit securities. Merchandise or
services that were purchased or contracted by individuals
online are never delivered. The fraud attributable to the
misrepresentation of a product advertised for sale through
an Internet auction site or the non-delivery of products
purchased through an Internet auction site. Investors are
enticed to invest in this fraudulent scheme by the promises
of abnormally high profits..
.
.
How to save children ?
Use parental control software.
.Place the computer in a highly trafficked area.
.
Bookmark for safety.
Avoid downloads.
.
.
General Tips
Use Strong Pass words//change it frequently.
Activate your firewall
Use anti-virus/malware software
Protect your Data
Use encryption for your most sensitive files such
as tax returns or financial records, make regular
back-ups of all your important data, and store it in
another location.
.
.
General Tips
Don’t accept friend’s request from unknown
person .
Don’t share your phone no /address on social
media
Don’t consider yourself luckiest to receive lottery
of one lakh pounds
.
Conceived and prepared by
Dr.Keshav Sathaye
keshavsathaye@gmail.com
.

More Related Content

What's hot

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
atuljaybhaye
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber crime
Cyber crimeCyber crime
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mazhar Nazik
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
dixitas
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
kiran yadav
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
Md. Mehadi Hassan Bappy
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
hirakhalid2394
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 

Viewers also liked

Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
John Palfreyman
 
Bawankashi (2)(Marathi Language)
Bawankashi (2)(Marathi Language)Bawankashi (2)(Marathi Language)
Bawankashi (2)(Marathi Language)
Dr.Keshav Sathaye
 
Freedom of media vis a-vis accountability
Freedom of media vis a-vis accountabilityFreedom of media vis a-vis accountability
Freedom of media vis a-vis accountability
Dr.Keshav Sathaye
 
Cyber-Crime e Social Media
Cyber-Crime e Social MediaCyber-Crime e Social Media
Cyber-Crime e Social Media
Manager.it
 
Cyber Crime and Social Media
Cyber Crime and Social MediaCyber Crime and Social Media
Cyber Crime and Social Mediajen-morgan
 
Script writing for telecast
Script writing for  telecastScript writing for  telecast
Script writing for telecast
Yagnesh sondarva
 
Youth crime,- Juvenile crime
Youth crime,- Juvenile crimeYouth crime,- Juvenile crime
Youth crime,- Juvenile crime
Irfan iftekhar
 
Script writing for Television & Radio
Script writing for Television & Radio Script writing for Television & Radio
Script writing for Television & Radio Dr.Keshav Sathaye
 
Crime & Violence
Crime & ViolenceCrime & Violence
Crime & Violence
RachelMarchildon
 
Suicide Risk Assessment and Interventions - no videos
Suicide Risk Assessment and Interventions - no videosSuicide Risk Assessment and Interventions - no videos
Suicide Risk Assessment and Interventions - no videos
Kevin J. Drab
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
Instant Checkmate
 
suicide presentation
 suicide presentation suicide presentation
suicide presentationuzmabb12045
 
Suicide - Psychiatry
Suicide - PsychiatrySuicide - Psychiatry
Suicide - Psychiatry
Meroshana Thaiyalan
 
juvenile delinquency
juvenile delinquencyjuvenile delinquency
juvenile delinquencyMuhammad Afiq
 
Instant Checkmate Background Check Glossary
Instant Checkmate Background Check GlossaryInstant Checkmate Background Check Glossary
Instant Checkmate Background Check Glossary
Instant Checkmate
 
Radio Script writing and Broadcasting
Radio Script writing and BroadcastingRadio Script writing and Broadcasting
Radio Script writing and Broadcasting
Mary Queen Bernardo
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
FM Radio Program Script
FM Radio Program ScriptFM Radio Program Script
FM Radio Program ScriptRoxanne Robes
 

Viewers also liked (20)

Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Bawankashi (2)(Marathi Language)
Bawankashi (2)(Marathi Language)Bawankashi (2)(Marathi Language)
Bawankashi (2)(Marathi Language)
 
Freedom of media vis a-vis accountability
Freedom of media vis a-vis accountabilityFreedom of media vis a-vis accountability
Freedom of media vis a-vis accountability
 
Facebook
FacebookFacebook
Facebook
 
Cyber-Crime e Social Media
Cyber-Crime e Social MediaCyber-Crime e Social Media
Cyber-Crime e Social Media
 
Cyber Crime and Social Media
Cyber Crime and Social MediaCyber Crime and Social Media
Cyber Crime and Social Media
 
Script writing for telecast
Script writing for  telecastScript writing for  telecast
Script writing for telecast
 
Youth crime,- Juvenile crime
Youth crime,- Juvenile crimeYouth crime,- Juvenile crime
Youth crime,- Juvenile crime
 
Script writing for Television & Radio
Script writing for Television & Radio Script writing for Television & Radio
Script writing for Television & Radio
 
Crime & Violence
Crime & ViolenceCrime & Violence
Crime & Violence
 
Suicide Risk Assessment and Interventions - no videos
Suicide Risk Assessment and Interventions - no videosSuicide Risk Assessment and Interventions - no videos
Suicide Risk Assessment and Interventions - no videos
 
Youth related crimes
Youth related crimesYouth related crimes
Youth related crimes
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
suicide presentation
 suicide presentation suicide presentation
suicide presentation
 
Suicide - Psychiatry
Suicide - PsychiatrySuicide - Psychiatry
Suicide - Psychiatry
 
juvenile delinquency
juvenile delinquencyjuvenile delinquency
juvenile delinquency
 
Instant Checkmate Background Check Glossary
Instant Checkmate Background Check GlossaryInstant Checkmate Background Check Glossary
Instant Checkmate Background Check Glossary
 
Radio Script writing and Broadcasting
Radio Script writing and BroadcastingRadio Script writing and Broadcasting
Radio Script writing and Broadcasting
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
FM Radio Program Script
FM Radio Program ScriptFM Radio Program Script
FM Radio Program Script
 

Similar to Cyber crime social media &; family

SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
Aalbert Albert
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Pardeep Kumar
 
Module vi mis
Module vi misModule vi mis
Module vi mis
Arnav Chowdhury
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
gaherwarsaloni1234
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
jcgevana
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
IJARIIT
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Fit Tri
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
srishtig993
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
123.pptx
123.pptx123.pptx
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rahul Reddy
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
Fahad Saleem
 

Similar to Cyber crime social media &; family (20)

SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
123.pptx
123.pptx123.pptx
123.pptx
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 

More from Dr.Keshav Sathaye

Tv media & Art
Tv media & ArtTv media & Art
Tv media & Art
Dr.Keshav Sathaye
 
Have a SOUND judgement !
Have a SOUND judgement !Have a SOUND judgement !
Have a SOUND judgement !
Dr.Keshav Sathaye
 
Changing contours of_media
Changing contours of_mediaChanging contours of_media
Changing contours of_media
Dr.Keshav Sathaye
 
News broadcast codes
News broadcast codesNews broadcast codes
News broadcast codes
Dr.Keshav Sathaye
 
Use of multimedia in school education-
Use of multimedia in school education-Use of multimedia in school education-
Use of multimedia in school education-
Dr.Keshav Sathaye
 
Presentation Lighting For Tv
Presentation Lighting For TvPresentation Lighting For Tv
Presentation Lighting For Tv
Dr.Keshav Sathaye
 
Advertising Ppt
Advertising PptAdvertising Ppt
Advertising Ppt
Dr.Keshav Sathaye
 
Edu Timesall[1]
Edu Timesall[1]Edu Timesall[1]
Edu Timesall[1]
Dr.Keshav Sathaye
 
Cv Dr. Sathaye
Cv Dr. SathayeCv Dr. Sathaye
Cv Dr. Sathaye
Dr.Keshav Sathaye
 

More from Dr.Keshav Sathaye (10)

Tv media & Art
Tv media & ArtTv media & Art
Tv media & Art
 
Tv media managemnt
Tv media managemnt Tv media managemnt
Tv media managemnt
 
Have a SOUND judgement !
Have a SOUND judgement !Have a SOUND judgement !
Have a SOUND judgement !
 
Changing contours of_media
Changing contours of_mediaChanging contours of_media
Changing contours of_media
 
News broadcast codes
News broadcast codesNews broadcast codes
News broadcast codes
 
Use of multimedia in school education-
Use of multimedia in school education-Use of multimedia in school education-
Use of multimedia in school education-
 
Presentation Lighting For Tv
Presentation Lighting For TvPresentation Lighting For Tv
Presentation Lighting For Tv
 
Advertising Ppt
Advertising PptAdvertising Ppt
Advertising Ppt
 
Edu Timesall[1]
Edu Timesall[1]Edu Timesall[1]
Edu Timesall[1]
 
Cv Dr. Sathaye
Cv Dr. SathayeCv Dr. Sathaye
Cv Dr. Sathaye
 

Recently uploaded

LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
lorraineandreiamcidl
 
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
AJHSSR Journal
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
AJHSSR Journal
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 
How social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdfHow social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdf
pramodkumar2310
 
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
AJHSSR Journal
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
SocioCosmos
 
Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....
SocioCosmos
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
madisonsmith478075
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
Digital Marketing Lab
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm RiskNon-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
AJHSSR Journal
 
Social Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfklSocial Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfkl
mdigitalmarketing001
 

Recently uploaded (16)

LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
 
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
How social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdfHow social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdf
 
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm RiskNon-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
 
Social Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfklSocial Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfkl
 

Cyber crime social media &; family

  • 1. Cyber crime-Social Media & Family An Indian Perspective
  • 2. CYBER LAWS To combat the crimes related to internet The Information Technology Act, 2000 was enacted with prime objective to create an enabling environment for commercial use of I.T. The IT Act specifies the acts which have been made punishable. The Indian Penal Code, 1860 has also been amended to take into its purview cyber crimes.
  • 3. Cyber crimes under the IT Act : . Hacking with Computer systems, Data alteration - Sec.66 Publishing obscene information - Sec.67 Un Authorised access to protected system Sec.70 Breach of Confidentiality and Privacy - Sec.72 Sending threatening messages by email - Sec 503 IPC Sending defamatory messages by email - Sec 499 IPC Forgery of electronic records - Sec 463 IPC Bogus websites, cyber frauds - Sec 420 IPC Email spoofing - Sec 463 IPC Web-Jacking - Sec. 383 IPC E-Mail Abuse - Sec.500 IPC
  • 4. What is a cyber crime ? . criminal activities carried out by means of computers or the Internet
  • 5. What is a social media ? . websites and applications that enable users to create and share content or to participate in social networking.
  • 6. Types of Cyber crimes Unauthorised access Hijacking: Pornography: Theft: Cyber Stalking: Identity Theft: Malicious Software Child soliciting and Abuse:
  • 7. Types of Cyber crimes Denial of service- Virus attack-Phishing spoofing-defamation-Int.time theft breach of privacy-E commerce frauds .
  • 8. Unauthorised Access . . Unauthorized access means any kind of access without the permission of either of the rightful or person in charge of the computer, computer system or computer network.
  • 9. Web Hijacking: . .Web hijacking means taking forceful control of another person’s website. In this case the owner of the website loses control over his website and its content
  • 10. Pornography: Pornography means showing sexual acts in order to cause sexual excitement. The definition of pornography also includes pornographic websites, pornographic magazines produced using computer and the internet pornography delivered over mobile phones.
  • 11. Child Pornography: . There is an easy access to the pornographic contents on the internet. Pedophiles lure the children by distributing pornographic material and then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Pedophiles contact children in the chat rooms posing as teenagers or a child of similar age and then they start becoming friendlier with them and win their confidence
  • 12. : . Child Pornography: How do they operate? Pedophiles use false identity to trap the children/teenagers Pedophiles contact children/teens in various chat rooms which are used by children/teen to interact with other children/teen. Befriend the child/teen. Extract personal information from the child/teen by winning his confidence.
  • 13. : . Cyber stalking: . Cyber Stalking means repeated acts of harassment or threatening behavior of the cyber criminal towards the victim by using internet services. Both kind of Stalkers i.e., Online & Offline – have desire to control the victims life.
  • 14. How do Cyber Stalkers operate? :They collect all personal information about the victim such as name, family background, Telephone Numbers of residence and work place, daily routine of the victim, address of residence and place of work, date of birth etc. If the stalker is one of the acquaintances of the victim he can easily get this information. If stalker is a stranger to victim, he collects the information from the internet resources such as various profiles, the victim may have filled in while opening the chat or e- mail account or while signing an account with some website.. .
  • 15. Denial of service Attack: : This is an attack in which the criminal floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide. This kind of attack is designed to bring the network to crash by flooding it with useless traffic. Another variation to a typical denial of service attack is known as a Distributed Denial of Service (DDoS) attack wherein the perpetrators are many and are geographically widespread. .
  • 16. Virus attacks: :Viruses usually affect the data on a computer, either by altering or deleting it. On the other hand worms merely make functional copies of themselves and do this repeatedly till they eat up all the available. .
  • 17. Phishing : Phishing is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information. By spamming large groups of people, the phisher counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with legitimately .
  • 18. Email spoofing : Email spoofing refers to email that appears to originate from one source but actually has been sent from another source. Email spoofing can also cause monetary damage. .
  • 19. . Cyber Defamation: When a person publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person’s friends, it is termed as cyber defamation. .
  • 20. . Internet time theft : Internet time refers to usage by an unauthorized person of the Internet hours paid for by another person. .
  • 21. . Breach of Privacy and Confidentiality : Privacy refers to the right of an individual/s to determine when, how and to what extent his or her personal data will be shared with others. Breach of privacy means unauthorized use or distribution or disclosure of personal information. Confidentiality means non disclosure of information to unauthorized or unwanted persons. In addition to Personal information some other type of information which useful for business and leakage of such information to other persons may cause damage to business or person, such information should be protected. .
  • 22. . E-commerce/ Investment Frauds: An offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities. Merchandise or services that were purchased or contracted by individuals online are never delivered. The fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site. Investors are enticed to invest in this fraudulent scheme by the promises of abnormally high profits.. .
  • 23. . How to save children ? Use parental control software. .Place the computer in a highly trafficked area. . Bookmark for safety. Avoid downloads. .
  • 24. . General Tips Use Strong Pass words//change it frequently. Activate your firewall Use anti-virus/malware software Protect your Data Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in another location. .
  • 25. . General Tips Don’t accept friend’s request from unknown person . Don’t share your phone no /address on social media Don’t consider yourself luckiest to receive lottery of one lakh pounds .
  • 26. Conceived and prepared by Dr.Keshav Sathaye keshavsathaye@gmail.com .