SlideShare a Scribd company logo
1 of 22
CYBER-CRIME
DON’T BE A VICTIM
Presenter:
ANSHUMAN TRIPATHI
CONTENTS
• Introduction
• History of cyber crime
• Manifestation
• Categories of cyber crime
• Types of cyber crime
• Statistics of Cyber crimes
• Cyber Laws
• Prevention of Cyber Crime
• Conclusion
• References
INTRODUCTION
• The internet has given rise to new opportunities
in every field we can think of – be it
entertainment, business, sports or education.
• There are two sides to a coin. Internet also has
its own disadvantages. One of the major
disadvantages is Cyber crime – illegal activity
committed on the internet.
HISTORY OF CYBER CRIME
• The first recorded cyber crime took place in the year 1820.
• In 1820, Joseph-Marie Jacquard, a textile manufacturer in
France, produced the loom. This device allowed the
repetition of a series of steps in the weaving of special
fabrics. This resulted in a fear amongst Jacquard's
employees that their traditional employment and livelihood
were being threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new
technology. This is the first recorded cyber crime!
MANIFESTATION
• Cyber-Crime= Cyber+Crime.
• Cyber- The term cyber was first used in 1982 in a science
fiction story ‘Burning Chrome’ by ‘William Gibson’ where it was
referred to as a computer generated virtual reality. In the
modern era anything associated with the internet and the
diverse internet culture comes under the Cyberspace.
• So cyber crime is crimes committed on cyberspace.
• Though there is no technical definition by any statutory body
for Cyber crime, it is broadly defined by the Computer Crime
Research Center as - “Crimes committed on the internet using
the computer either as a tool or a targeted victim.”
CATEGORIES OF CYBER CRIME
• Cyber-Crime Against Persons
• Cyber-Crime Against Property
• Cyber-Crime Against Government
• Cyber-Crime Against Society at large
CYBER-CRIME AGAINST PERSONS
• Hacking: It means unauthorized control/access over computer system and
act of hacking completely destroys the whole data as well as computer
programs. Hackers usually hacks telecommunication and mobile network.
• Cross Site Scripting (XSS): Cross-site scripting (XSS) is a
security exploit in which the attacker inserts malicious coding
into a link that appears to be from a trustworthy source. When
someone clicks on the link, the embedded programming is
submitted allowing the attacker to steal information.
• Vishing: The name comes from “voice” and “phishing” Vishing is the act of
using the telephone in an attempt to scam the user.
• DDoS Attack: In computing, a denial-of-service (DoS) or distributed denial-
of-service (DDoS) attack is an attempt to make a machine or network
resource unavailable to its intended users.
• Phishing: phishers attempt to steal your personal information. They send
out e-mails that appear to come from legitimate websites such as eBay,
PayPal, or other banking institutions and ask for your account and
passwords. Ex-"http://www.ebay.com" is a valid Web addresse,
but "http://www.ebay.validate-info.com" and "http://ebay.login123.com"
are false addresses, which may be used by phishers.
• Harassment via E-Mails: This is very common type of harassment through
sending letters, attachments of files & folders i.e. via e-mails. At present
harassment is common as usage of social sites i.e. Facebook, Twitter etc.
increasing day by day.
• Defamation: It involves any person with intent to lower down the dignity of
the person by hacking his mail account and sending some mails with using
vulgar language to unknown persons mail account.
• Carding: It means false ATM cards i.e. Debit and Credit cards used by
criminals through withdrawing money from the victim’s bank account. There
is always unauthorized use of ATM cards in this type of cyber crimes.
• E-Mail Spoofing: A spoofed e-mail may be said to be one, which misrepresents
its origin. It shows it’s origin to be different from which actually it originates
• SMS Spoofing: Here a offender steals identity of another person in the form of
mobile phone number and sending SMS via internet and receiver gets the SMS
from the mobile phone number of the victim. It is very serious cyber crime
against any individual.
• Child Pornography: In this cyber crime defaulters create, distribute, or access
materials that sexually exploit underage children.
CYBER-CRIME AGAINST PROPERTY
• Cyber Trespass: It means to access someone’s computer or network
without the right authorization of the owner and disturb, alter, misuse, or
damage data or system by using wireless internet connection.
• Transmitting Virus: Viruses are programs written by programmers that
attach themselves to a computer or a file and then circulate themselves to
other files and to other computers on a network. They mainly affect the data
on a computer, either by altering or deleting it. Worm attacks plays major
role in affecting the computer system of the individuals.
• Cyber Squatting: It involves two persons claiming for the same Domain
Name either by claiming that they had registered the name first on by right
of using it before the other or using something similar to that previously. For
example two similar names i.e. www.yahoo.com and www.yahhoo.com
• Intellectual Property Crimes: Intellectual property consists of a bunch of
rights. The most common type of IPR violation may be said to be software
piracy, violation of copyright, trademark, patents, designs and theft of
computer source code etc.
CYBER CRIMES AGAINST GOVERNMENT
• Cyber terrorism is one distinct kind of crime in this category.
The medium of Cyberspace is being used by individuals and
groups to threaten the international governments as also to
threaten the citizens of a country. This crime is called cyber
terrorism when an individual "cracks" into a government or
military maintained website. The Parliament attack in Delhi and
the Mumbai attack fall under this category.
• Every country has its own way of defining cyber crime, which is
odd to its own socio-cultural situations. For instance, in India
defamation is a significant and rampant form of cyber
crime.
CYBERCRIMES AGAINST SOCIETY AT LARGE
• Child Pornography: In this act there is use of computer networks to create,
distribute, or access materials that sexually exploit underage children.
• Online Gambling: Online fraud and cheating is one of the most beneficial
businesses that are growing today in the cyber space. In India a lot of betting and
gambling is done on the name of cricket through computer and internet, credit card
crimes, offering jobs, etc.
• Financial Crimes: This type of offence is common as there is huge growth in the
users of networking sites and phone networking where culprit will try to attack by
sending bogus mails or messages through internet. Ex: Using credit cards by
obtaining password illegally.
• Forgery: It means to deceive large number of persons by sending threatening mails
as online business transactions are becoming the habitual need of today’s life style.
THE TOP 5 MOST BRUTAL CYBER ATTACKS
OF 2014 SO FAR
• eBay
• Domino’s Pizza
• Montana Health Department
• Evernote and Feedly
• P.F. Chang’s Restaurants
Src-https://www.forbes.com
COUNTRY DISTRIBUTION IN CYBERCRIME-2013
TOP TARGETS OF 2013
TOP 10 ATTACK TECHNIQUES IN 2013
CYBER LAWS:
• There is absolutely no comprehensive law on Cybercrime any where in the world.
This is reason that the investigating agencies like FBI are finding the Cyberspace to
be an extremely difficult terrain.
• India had enacted its first Cyber Law through IT Act 2000. It has been amended and
now in 2008 the revised version is under implementation.
• IT Act 2000
• IT Amendment Bill 2006
• IT Amendment Bill 2008
• According to European Convention, there is no exact definition of cyber crime. Every
country has its own way of defining cyber crime, which is peculiar to its own socio-
cultural situations. For instance, in India defamation is a significant and rampant form
of cyber crime.
PREVENTION OF CYBER CRIME
• Sailesh Kumar Zarkar, technical advisor and network security consultant to the
Mumbai Police Cyber crime Cell, advocates the 5P mantra for online security:
Precaution, Prevention, Protection, Preservation and Perseverance.
• One should avoid disclosing any personal information to strangers via e-
mail or while chatting or any social networking site.
• One must avoid sending any photograph to strangers by online as
misusing or modification of photograph incidents increasing day by day.
• An updated Anti-virus software to guard against virus attacks should be
used by all the netizens.
• A person should never send his credit card or debit card number to any
site that is not secured, to guard against frauds.
CONCLUSION
• In cyberspace, cyber crime replace the bytes with bullets.
• Hacking is the thing which need more concentration because most of data
need security.
• The key to protecting yourself is being aware.
• Indian Laws are well drafted and are capable of handling all kinds of
challenges as posed by cyber criminals. However, the enforcement agencies
are required to be well versed with the changing technologies and Laws.” In
times like these we must protect ourselves from cyber crime. Anti-virus
software, firewalls and security patches are just the beginning”.
• There is a whole other world that exists in cyberspace… So make sure
that your information travels safely.
REFERENCES
• International Journal of Advanced Research in Computer Science and Software
Engineering Volume 3, Issue 5, May 2013.
• International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-
2013.
• International Journal Of Engineering And Computer Science ISSN:2319-7242, Volume2
Issue 8 August, 2013 Page No. 2555-2559
• www.forbes.com
THANK YOU

More Related Content

What's hot

What's hot (20)

cyber security
cyber securitycyber security
cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
The evolution of computer viruses
The evolution of computer virusesThe evolution of computer viruses
The evolution of computer virusesbrya2rexmc
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013Marian Merritt
 
Cyber Wellness Program for the philippines
Cyber Wellness Program  for the philippinesCyber Wellness Program  for the philippines
Cyber Wellness Program for the philippinesSonnie Santos
 
Accomplishments
AccomplishmentsAccomplishments
Accomplishmentscalldoming
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 
Philippines Republic act no. 10175
Philippines Republic act no. 10175Philippines Republic act no. 10175
Philippines Republic act no. 10175arsieorgano
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepIBM Security
 
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampWSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampSonnie Santos
 

Viewers also liked (20)

Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
The evolution of computer viruses
The evolution of computer virusesThe evolution of computer viruses
The evolution of computer viruses
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 
Cyber Wellness Program for the philippines
Cyber Wellness Program  for the philippinesCyber Wellness Program  for the philippines
Cyber Wellness Program for the philippines
 
Accomplishments
AccomplishmentsAccomplishments
Accomplishments
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Philippines Republic act no. 10175
Philippines Republic act no. 10175Philippines Republic act no. 10175
Philippines Republic act no. 10175
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampWSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
 

Similar to Cyber crime-140128140443-phpapp02 (1)

Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptxClichesin
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 

Similar to Cyber crime-140128140443-phpapp02 (1) (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Final ppt
Final pptFinal ppt
Final ppt
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 

Recently uploaded

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Cyber crime-140128140443-phpapp02 (1)

  • 1. CYBER-CRIME DON’T BE A VICTIM Presenter: ANSHUMAN TRIPATHI
  • 2. CONTENTS • Introduction • History of cyber crime • Manifestation • Categories of cyber crime • Types of cyber crime • Statistics of Cyber crimes • Cyber Laws • Prevention of Cyber Crime • Conclusion • References
  • 3. INTRODUCTION • The internet has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. • There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
  • 4. HISTORY OF CYBER CRIME • The first recorded cyber crime took place in the year 1820. • In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  • 5. MANIFESTATION • Cyber-Crime= Cyber+Crime. • Cyber- The term cyber was first used in 1982 in a science fiction story ‘Burning Chrome’ by ‘William Gibson’ where it was referred to as a computer generated virtual reality. In the modern era anything associated with the internet and the diverse internet culture comes under the Cyberspace. • So cyber crime is crimes committed on cyberspace. • Though there is no technical definition by any statutory body for Cyber crime, it is broadly defined by the Computer Crime Research Center as - “Crimes committed on the internet using the computer either as a tool or a targeted victim.”
  • 6. CATEGORIES OF CYBER CRIME • Cyber-Crime Against Persons • Cyber-Crime Against Property • Cyber-Crime Against Government • Cyber-Crime Against Society at large
  • 7. CYBER-CRIME AGAINST PERSONS • Hacking: It means unauthorized control/access over computer system and act of hacking completely destroys the whole data as well as computer programs. Hackers usually hacks telecommunication and mobile network. • Cross Site Scripting (XSS): Cross-site scripting (XSS) is a security exploit in which the attacker inserts malicious coding into a link that appears to be from a trustworthy source. When someone clicks on the link, the embedded programming is submitted allowing the attacker to steal information. • Vishing: The name comes from “voice” and “phishing” Vishing is the act of using the telephone in an attempt to scam the user. • DDoS Attack: In computing, a denial-of-service (DoS) or distributed denial- of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.
  • 8. • Phishing: phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions and ask for your account and passwords. Ex-"http://www.ebay.com" is a valid Web addresse, but "http://www.ebay.validate-info.com" and "http://ebay.login123.com" are false addresses, which may be used by phishers. • Harassment via E-Mails: This is very common type of harassment through sending letters, attachments of files & folders i.e. via e-mails. At present harassment is common as usage of social sites i.e. Facebook, Twitter etc. increasing day by day. • Defamation: It involves any person with intent to lower down the dignity of the person by hacking his mail account and sending some mails with using vulgar language to unknown persons mail account. • Carding: It means false ATM cards i.e. Debit and Credit cards used by criminals through withdrawing money from the victim’s bank account. There is always unauthorized use of ATM cards in this type of cyber crimes.
  • 9. • E-Mail Spoofing: A spoofed e-mail may be said to be one, which misrepresents its origin. It shows it’s origin to be different from which actually it originates • SMS Spoofing: Here a offender steals identity of another person in the form of mobile phone number and sending SMS via internet and receiver gets the SMS from the mobile phone number of the victim. It is very serious cyber crime against any individual. • Child Pornography: In this cyber crime defaulters create, distribute, or access materials that sexually exploit underage children.
  • 10. CYBER-CRIME AGAINST PROPERTY • Cyber Trespass: It means to access someone’s computer or network without the right authorization of the owner and disturb, alter, misuse, or damage data or system by using wireless internet connection. • Transmitting Virus: Viruses are programs written by programmers that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They mainly affect the data on a computer, either by altering or deleting it. Worm attacks plays major role in affecting the computer system of the individuals. • Cyber Squatting: It involves two persons claiming for the same Domain Name either by claiming that they had registered the name first on by right of using it before the other or using something similar to that previously. For example two similar names i.e. www.yahoo.com and www.yahhoo.com
  • 11. • Intellectual Property Crimes: Intellectual property consists of a bunch of rights. The most common type of IPR violation may be said to be software piracy, violation of copyright, trademark, patents, designs and theft of computer source code etc.
  • 12. CYBER CRIMES AGAINST GOVERNMENT • Cyber terrorism is one distinct kind of crime in this category. The medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to threaten the citizens of a country. This crime is called cyber terrorism when an individual "cracks" into a government or military maintained website. The Parliament attack in Delhi and the Mumbai attack fall under this category. • Every country has its own way of defining cyber crime, which is odd to its own socio-cultural situations. For instance, in India defamation is a significant and rampant form of cyber crime.
  • 13. CYBERCRIMES AGAINST SOCIETY AT LARGE • Child Pornography: In this act there is use of computer networks to create, distribute, or access materials that sexually exploit underage children. • Online Gambling: Online fraud and cheating is one of the most beneficial businesses that are growing today in the cyber space. In India a lot of betting and gambling is done on the name of cricket through computer and internet, credit card crimes, offering jobs, etc. • Financial Crimes: This type of offence is common as there is huge growth in the users of networking sites and phone networking where culprit will try to attack by sending bogus mails or messages through internet. Ex: Using credit cards by obtaining password illegally. • Forgery: It means to deceive large number of persons by sending threatening mails as online business transactions are becoming the habitual need of today’s life style.
  • 14. THE TOP 5 MOST BRUTAL CYBER ATTACKS OF 2014 SO FAR • eBay • Domino’s Pizza • Montana Health Department • Evernote and Feedly • P.F. Chang’s Restaurants Src-https://www.forbes.com
  • 15. COUNTRY DISTRIBUTION IN CYBERCRIME-2013
  • 17. TOP 10 ATTACK TECHNIQUES IN 2013
  • 18. CYBER LAWS: • There is absolutely no comprehensive law on Cybercrime any where in the world. This is reason that the investigating agencies like FBI are finding the Cyberspace to be an extremely difficult terrain. • India had enacted its first Cyber Law through IT Act 2000. It has been amended and now in 2008 the revised version is under implementation. • IT Act 2000 • IT Amendment Bill 2006 • IT Amendment Bill 2008 • According to European Convention, there is no exact definition of cyber crime. Every country has its own way of defining cyber crime, which is peculiar to its own socio- cultural situations. For instance, in India defamation is a significant and rampant form of cyber crime.
  • 19. PREVENTION OF CYBER CRIME • Sailesh Kumar Zarkar, technical advisor and network security consultant to the Mumbai Police Cyber crime Cell, advocates the 5P mantra for online security: Precaution, Prevention, Protection, Preservation and Perseverance. • One should avoid disclosing any personal information to strangers via e- mail or while chatting or any social networking site. • One must avoid sending any photograph to strangers by online as misusing or modification of photograph incidents increasing day by day. • An updated Anti-virus software to guard against virus attacks should be used by all the netizens. • A person should never send his credit card or debit card number to any site that is not secured, to guard against frauds.
  • 20. CONCLUSION • In cyberspace, cyber crime replace the bytes with bullets. • Hacking is the thing which need more concentration because most of data need security. • The key to protecting yourself is being aware. • Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.” In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning”. • There is a whole other world that exists in cyberspace… So make sure that your information travels safely.
  • 21. REFERENCES • International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013. • International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August- 2013. • International Journal Of Engineering And Computer Science ISSN:2319-7242, Volume2 Issue 8 August, 2013 Page No. 2555-2559 • www.forbes.com