This presentation is based on the lectures delivered for students of B. Voc. (Semester 2 ) Computing Skills (TISS) at HMMRA, Vile Parle, Mumbai during January – February 2019
Contents of this presentation may also be useful to other students pursuing similar courses.
This document discusses cyber crime and its various aspects. It begins with definitions of cyber crime from various sources and outlines the history and types of cyber criminals. The main categories of cyber crimes are described as those against persons, properties, and government. Specific crimes under each category like harassment, stalking, and hacking are explained. The document also covers cyber security, laws, dos and don'ts, and recent cyber crime instances in India.
The basic fundamental of cybersecurity and how can it be used for unethical purposes.
For this type of presentations (customised), you can contact me here : rishav.sadhu11@gmail.com
Cyber crime & security final tapanTapan Khilar
This document discusses various types of cybercrimes and the relevant laws in India. It defines cybercrimes as crimes that involve computers and the internet. The key points covered are:
- Types of cybercrimes include hacking, phishing, computer viruses, cyber pornography, denial of service attacks, and software piracy.
- The Indian IT Act 2000 is the main law governing cybercrimes and has sections dealing with hacking, data alteration, unauthorized access, and publishing obscene material.
- Other relevant laws include the IPC for offenses like fraud, forgery and criminal breach of trust.
- Investigating cybercrimes involves computer forensics to preserve digital evidence that can be accepted in
The document discusses various types of cybercrimes such as hacking, virus dissemination, computer vandalism, and software piracy. It also covers topics like internet security, ways to protect computers from cyber threats, and etiquette for safe internet use. Examples are provided of security measures like using antivirus software and firewalls, as well as behaviors to avoid like responding to harassing messages online.
Cybercrime is on the rise globally and in India. India ranks 11th in the world for cybercrime, constituting 3% of global cybercrime. Common cybercrimes in India include denial of service attacks, website defacement, spam, computer viruses, pornography, cyber squatting, cyber stalking, and phishing. While Indian laws against cybercrime are well-drafted, enforcement has been lacking, with few arrests compared to the number of reported cases. Increased internet and technology use in India has contributed to higher cybercrime rates in recent years. Stronger enforcement is needed to curb the growth of cybercrimes in India.
This document discusses cyber crime and security. It begins with an overview of topics to be covered, including the history and basics of cyber crimes, various categories of cyber crimes, and motivations for cyber attacks. It then discusses the history of cyber crimes and defines cyber attacks and cyber crimes. Various types of cyber crimes are outlined, including those against persons, property, and government. Common cyber crime techniques like social engineering, viruses, and ransomware are explained. The document notes that cyber crime groups are starting to operate more like organized crime rings. It concludes by discussing how opportunities provided by Web 2.0 technologies can be exploited for cyber crimes.
This document provides an overview of cyber security topics including wireless networks, types of attacks, security goals, computer forensics, security threats, examples of cyber crimes, ransomware attacks, strong passwords, malicious code, programming bugs, cryptography, digital signatures, security procedures, guidelines, security laws, intellectual property rights, and security audits. It discusses key concepts such as confidentiality, integrity, and availability as goals for security and describes common cyber crimes like identity theft, hacking, and credit card fraud.
The document discusses cybercrime and cybersecurity. It defines cybercrime and provides examples like hacking, virus attacks, and online fraud. It then outlines the history of cybercrime from the first recorded attack in 1820 to modern crimes. The document categorizes different types of cybercrimes and describes common methods used by cybercriminals. It emphasizes the importance of cyber forensics and security measures individuals and organizations can take to prevent attacks.
This document discusses cyber crime and its various aspects. It begins with definitions of cyber crime from various sources and outlines the history and types of cyber criminals. The main categories of cyber crimes are described as those against persons, properties, and government. Specific crimes under each category like harassment, stalking, and hacking are explained. The document also covers cyber security, laws, dos and don'ts, and recent cyber crime instances in India.
The basic fundamental of cybersecurity and how can it be used for unethical purposes.
For this type of presentations (customised), you can contact me here : rishav.sadhu11@gmail.com
Cyber crime & security final tapanTapan Khilar
This document discusses various types of cybercrimes and the relevant laws in India. It defines cybercrimes as crimes that involve computers and the internet. The key points covered are:
- Types of cybercrimes include hacking, phishing, computer viruses, cyber pornography, denial of service attacks, and software piracy.
- The Indian IT Act 2000 is the main law governing cybercrimes and has sections dealing with hacking, data alteration, unauthorized access, and publishing obscene material.
- Other relevant laws include the IPC for offenses like fraud, forgery and criminal breach of trust.
- Investigating cybercrimes involves computer forensics to preserve digital evidence that can be accepted in
The document discusses various types of cybercrimes such as hacking, virus dissemination, computer vandalism, and software piracy. It also covers topics like internet security, ways to protect computers from cyber threats, and etiquette for safe internet use. Examples are provided of security measures like using antivirus software and firewalls, as well as behaviors to avoid like responding to harassing messages online.
Cybercrime is on the rise globally and in India. India ranks 11th in the world for cybercrime, constituting 3% of global cybercrime. Common cybercrimes in India include denial of service attacks, website defacement, spam, computer viruses, pornography, cyber squatting, cyber stalking, and phishing. While Indian laws against cybercrime are well-drafted, enforcement has been lacking, with few arrests compared to the number of reported cases. Increased internet and technology use in India has contributed to higher cybercrime rates in recent years. Stronger enforcement is needed to curb the growth of cybercrimes in India.
This document discusses cyber crime and security. It begins with an overview of topics to be covered, including the history and basics of cyber crimes, various categories of cyber crimes, and motivations for cyber attacks. It then discusses the history of cyber crimes and defines cyber attacks and cyber crimes. Various types of cyber crimes are outlined, including those against persons, property, and government. Common cyber crime techniques like social engineering, viruses, and ransomware are explained. The document notes that cyber crime groups are starting to operate more like organized crime rings. It concludes by discussing how opportunities provided by Web 2.0 technologies can be exploited for cyber crimes.
This document provides an overview of cyber security topics including wireless networks, types of attacks, security goals, computer forensics, security threats, examples of cyber crimes, ransomware attacks, strong passwords, malicious code, programming bugs, cryptography, digital signatures, security procedures, guidelines, security laws, intellectual property rights, and security audits. It discusses key concepts such as confidentiality, integrity, and availability as goals for security and describes common cyber crimes like identity theft, hacking, and credit card fraud.
The document discusses cybercrime and cybersecurity. It defines cybercrime and provides examples like hacking, virus attacks, and online fraud. It then outlines the history of cybercrime from the first recorded attack in 1820 to modern crimes. The document categorizes different types of cybercrimes and describes common methods used by cybercriminals. It emphasizes the importance of cyber forensics and security measures individuals and organizations can take to prevent attacks.
Cybercrime involves using computers or the internet to steal identities or import illegal programs. The first recorded cybercrime took place in 1820. There are different types of cybercrimes such as hacking, denial of service attacks, computer viruses, and software piracy. Cybercrimes also include using computers to attack other systems, commit real-world crimes, or steal proprietary information. Common cyber attacks include financial fraud, sabotage of networks, theft of data, and unauthorized access. Internet security aims to establish rules to protect against such attacks by using antivirus software, firewalls, and updating security settings regularly.
This document provides an introduction to cybercrime, including definitions of key terms, classifications of cybercrimes, and descriptions of common cybercrime activities. It defines cybercrime as illegal activities that target computer systems and data. Cybercrimes are categorized as those against individuals, property, organizations, and society. Examples include phishing, spamming, hacking, software piracy, and cyberterrorism. Cybercriminals are also classified as those seeking recognition, financial gain, or insider revenge.
Cyber crime involves unlawful acts where a computer is used either as a tool or target. The document discusses the history of cyber crimes from the first recorded incident in 1820. It categorizes cyber crimes as those targeting computers or using computers as weapons to commit real-world crimes. Various types of cyber crimes are explained such as hacking, DDoS attacks, viruses, phishing, and cyber terrorism. The document emphasizes that cyber crimes threaten national security and discusses cyber security and Indian cyber laws.
The document discusses an introduction to cyber security presented by Himansh Bhandari. It defines cyber security as the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. It discusses the history and evolution of the internet. It also covers types of malware like viruses, worms, Trojan horses and spyware. It discusses types of hackers like white hat, grey hat and black hat hackers. It provides information on implementing cyber security for mobile phones, banking and in India. It highlights major cyber security problems like viruses, hackers, malware and password cracking and discusses solutions to prevent them.
Computer crime and internet crime privacyGouthamXander
This document discusses computer crime and internet crime. It defines computer crime as any crime committed with the help of a computer. The history of computer crime is explored, from early physical damage to systems in the 1960s-1980s to modern financial crimes and malware attacks enabled by greater internet access and connectivity. Various categories of computer crime are also outlined, including computer viruses, denial of service attacks, malware, hacking, pirating, illegal trading, cyber terrorism, and pornography. Ways to protect against computer crime through anti-virus software, firewalls, and online safety are suggested.
This document discusses cyber crime, including its history, types, and how to prevent it. It begins with an introduction defining cyber crime as any illegal action involving a computer network. It then covers the history of cyber crimes evolving from hackers accessing networks for thrills to criminals spreading viruses. The main types of cyber crimes discussed are hacking, identity theft, virus dissemination, software piracy, cyberstalking, spamming and phishing. The document also addresses the growth of cyber crimes in India and provides tips for prevention such as awareness, strong passwords, antivirus software, and reviewing statements regularly.
Cyber security is the process of protecting networks, devices, and data from digital threats. It involves using authentication mechanisms like usernames and passwords to verify users' identities. The history of cyber security dates back 50 years to the development of the internet, when computer viruses and network intrusions emerged. There are many types of cyber threats, including malware, phishing, and denial of service attacks. Cyber security faces ongoing challenges in securing confidential information from hackers while protecting critical infrastructure and users' privacy.
This document provides an overview of cyber crime and security. It begins with an introduction that defines cyber crime and notes it is a prevalent crime in modern India. It then covers the history of cyber crime beginning with hackers illegally accessing computer networks. The document outlines several categories of cyber crime like identity theft, hacking, and cyber espionage. It discusses prevention methods and concludes with the 90 sections of the Indian IT Act that address various cyber crimes and penalties.
Cyber crime is a growing problem in India. Some common cyber crimes reported in India include phishing, hacking of government websites, and identity theft. India ranks 11th globally for reported cyber crimes, which are increasing due to factors like rapid growth of internet users. Common cyber crimes involve unauthorized access to systems, data theft and alteration, and using computers to enable other illicit activities. While laws like the IT Act 2000 have been enacted to tackle cyber crimes, enforcement remains a challenge as only a small percentage of crimes are reported. Techniques like antivirus software, firewalls, and educating users can help address the problem.
Cybercrime encompasses criminal acts using computers and networks, known as hacking, as well as traditional crimes conducted online like fraud and identity theft. Hacking is the unauthorized access of computer systems and networks, while hackers seek and exploit weaknesses. Common types of hacking include website, network, email, and password hacking. Identity theft involves personal information being stolen and used without permission, causing financial and reputational harm. Malicious software, or malware, is software designed to harm computers and users, and includes viruses, worms, adware, trojans, spyware and rootkits. Cyberstalking and harassment laws prohibit monitoring, threats, and gathering private information to threaten or harass individuals online. Theft involves taking property
This document discusses various types of cyber crimes such as hacking, child pornography, denial of service attacks, virus dissemination, cyber terrorism, and software piracy. It provides examples of the earliest recorded cyber crime in 1820 and describes how hackers illegally access computer systems. The text also addresses how the internet enables sexual abuse of children worldwide and how cyber criminals flood networks to deprive victims of access. Five men from Russia and Ukraine were recently charged in the biggest data breach in US history involving theft of over 160 credit card numbers from companies like Nasdaq and JC Penney, costing more than $300 million. Cyber security aims to establish rules to protect against internet attacks through measures like antivirus software, firewalls, and
-The project "Strengthening European Network Centres of Excellence in Cybercrime" (SENTER
project, Reference No HOME/2014/ISFP/AG/7170) is funded by the European Commission under
Internal Security Fund-Police 2014-2020 (ISFP). The main goal of the project is to create a single
point of Reference for EU national Cybercrime Centres of Excellence (CoE) and develop further the
Network of national CoE into well-defined and well-functioning community. More details here: http://www.senter-project.eu/
The document discusses cyber crime and cyber security. It defines cyber crime as crimes committed using computers or online. It discusses the history and evolution of cyber crimes, common types like financial fraud and hacking, and percentages of different crimes. The document also covers cyber threats, security measures, and cyber laws in Pakistan. The National Response Center for Cyber Crime was formed to monitor cyber criminals and Pakistan passed the Prevention of Electronic Crimes Ordinance in 2007 to address cyber crimes, though laws are still being developed.
Cyber crime threatens financial institutions in several ways. Hackers can access personal or sensitive information by breaking into computers. Cyber stalking and identity theft are also problems. Malicious software can steal data or damage systems. Mobile and online banking are growing targets as they handle more transactions electronically. To address cyber crime, financial institutions must implement security features, share threat information, and work with law enforcement internationally since cyber crimes often cross borders. Comprehensive strategies include prevention, investigation, prosecution, and cooperation between public and private sectors.
Phishing is one of the oldest tricks in the book of hackers. But as old as it might be, phishing still remains the most lucrative tool for cybercriminals. In this presentation, we will help you understand about phishing and tell you how you can avoid phishing attacks.
The document discusses various cybersecurity attack vectors and how organizations can protect themselves. It outlines common attack methods like ransomware, malicious code delivery, social engineering, and phishing. It then recommends that organizations conduct regular security audits, establish governance policies, create an incident response plan, and provide cybersecurity education to employees. The document promotes cybersecurity services from Future Point of View including vulnerability testing, forensics, and training to help organizations enhance their protections.
This document discusses cyber security and cyber crimes. It begins with an introduction that defines cyber security and notes the increasing security threats online. It then covers key topics like the meaning of cyber, the need for cyber security, major security problems like viruses and hackers, and solutions for implementing and maintaining security. Specific security issues are explained like viruses, worms, different types of hackers, malware, Trojan horses, and password cracking. The document concludes with sections on cyber security being a shared responsibility and overviews of cyber crime growth, India's cyber security strategy, and some of the biggest cyber attacks in 2020.
This document discusses cybercrime, including definitions, types, causes, and effects. It defines cybercrime as any crime involving a computer or network, with the computer used to commit or be targeted by the crime. Common types of cybercrimes mentioned include hacking, theft of copyrighted material, cyberstalking, identity theft, and child exploitation. Causes cited include economic incentives, ideology, structural factors online, and personal vendettas. Effects can include lost revenue, wasted time, damaged reputations, and reduced productivity. The document also provides an overview of cybercrimes in Nepal, existing laws, and tips for staying safe online such as using strong passwords and updated security software.
This document discusses cyber security. It defines cyber security as technologies and processes designed to protect computers, networks, and data from unauthorized access and attacks over the internet. The three core principles of cyber security are confidentiality, integrity, and availability. Several types of cyber attacks are described such as malware, phishing, and denial of service attacks. Major historical cyber attacks are outlined including the Morris Worm in 1988 and the Anthem hack in 2015 that breached 80 million records. Common attack patterns and measures to prevent cyber attacks like using complex passwords and encryption are also summarized.
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
content explained:-
what is cyber crime
history
categories
types
motives
safety tips
cyber security
advantages and disadvantages
cyber law
cyber law objectives
cyber law in india
conclusion
The document discusses cyber crime and security. It defines cyber crime as criminal activities involving computers, such as hacking, stealing data, and identity theft. The document outlines several types of cyber crimes like hacking, denial of service attacks, software piracy, and cyber terrorism. It also discusses cyber security measures that can help prevent cyber crimes, such as using antivirus software, firewalls, and strong passwords. The document concludes that cyber crimes are increasing and that cyber security is needed to help protect against online threats.
Cybercrime involves using computers or the internet to steal identities or import illegal programs. The first recorded cybercrime took place in 1820. There are different types of cybercrimes such as hacking, denial of service attacks, computer viruses, and software piracy. Cybercrimes also include using computers to attack other systems, commit real-world crimes, or steal proprietary information. Common cyber attacks include financial fraud, sabotage of networks, theft of data, and unauthorized access. Internet security aims to establish rules to protect against such attacks by using antivirus software, firewalls, and updating security settings regularly.
This document provides an introduction to cybercrime, including definitions of key terms, classifications of cybercrimes, and descriptions of common cybercrime activities. It defines cybercrime as illegal activities that target computer systems and data. Cybercrimes are categorized as those against individuals, property, organizations, and society. Examples include phishing, spamming, hacking, software piracy, and cyberterrorism. Cybercriminals are also classified as those seeking recognition, financial gain, or insider revenge.
Cyber crime involves unlawful acts where a computer is used either as a tool or target. The document discusses the history of cyber crimes from the first recorded incident in 1820. It categorizes cyber crimes as those targeting computers or using computers as weapons to commit real-world crimes. Various types of cyber crimes are explained such as hacking, DDoS attacks, viruses, phishing, and cyber terrorism. The document emphasizes that cyber crimes threaten national security and discusses cyber security and Indian cyber laws.
The document discusses an introduction to cyber security presented by Himansh Bhandari. It defines cyber security as the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. It discusses the history and evolution of the internet. It also covers types of malware like viruses, worms, Trojan horses and spyware. It discusses types of hackers like white hat, grey hat and black hat hackers. It provides information on implementing cyber security for mobile phones, banking and in India. It highlights major cyber security problems like viruses, hackers, malware and password cracking and discusses solutions to prevent them.
Computer crime and internet crime privacyGouthamXander
This document discusses computer crime and internet crime. It defines computer crime as any crime committed with the help of a computer. The history of computer crime is explored, from early physical damage to systems in the 1960s-1980s to modern financial crimes and malware attacks enabled by greater internet access and connectivity. Various categories of computer crime are also outlined, including computer viruses, denial of service attacks, malware, hacking, pirating, illegal trading, cyber terrorism, and pornography. Ways to protect against computer crime through anti-virus software, firewalls, and online safety are suggested.
This document discusses cyber crime, including its history, types, and how to prevent it. It begins with an introduction defining cyber crime as any illegal action involving a computer network. It then covers the history of cyber crimes evolving from hackers accessing networks for thrills to criminals spreading viruses. The main types of cyber crimes discussed are hacking, identity theft, virus dissemination, software piracy, cyberstalking, spamming and phishing. The document also addresses the growth of cyber crimes in India and provides tips for prevention such as awareness, strong passwords, antivirus software, and reviewing statements regularly.
Cyber security is the process of protecting networks, devices, and data from digital threats. It involves using authentication mechanisms like usernames and passwords to verify users' identities. The history of cyber security dates back 50 years to the development of the internet, when computer viruses and network intrusions emerged. There are many types of cyber threats, including malware, phishing, and denial of service attacks. Cyber security faces ongoing challenges in securing confidential information from hackers while protecting critical infrastructure and users' privacy.
This document provides an overview of cyber crime and security. It begins with an introduction that defines cyber crime and notes it is a prevalent crime in modern India. It then covers the history of cyber crime beginning with hackers illegally accessing computer networks. The document outlines several categories of cyber crime like identity theft, hacking, and cyber espionage. It discusses prevention methods and concludes with the 90 sections of the Indian IT Act that address various cyber crimes and penalties.
Cyber crime is a growing problem in India. Some common cyber crimes reported in India include phishing, hacking of government websites, and identity theft. India ranks 11th globally for reported cyber crimes, which are increasing due to factors like rapid growth of internet users. Common cyber crimes involve unauthorized access to systems, data theft and alteration, and using computers to enable other illicit activities. While laws like the IT Act 2000 have been enacted to tackle cyber crimes, enforcement remains a challenge as only a small percentage of crimes are reported. Techniques like antivirus software, firewalls, and educating users can help address the problem.
Cybercrime encompasses criminal acts using computers and networks, known as hacking, as well as traditional crimes conducted online like fraud and identity theft. Hacking is the unauthorized access of computer systems and networks, while hackers seek and exploit weaknesses. Common types of hacking include website, network, email, and password hacking. Identity theft involves personal information being stolen and used without permission, causing financial and reputational harm. Malicious software, or malware, is software designed to harm computers and users, and includes viruses, worms, adware, trojans, spyware and rootkits. Cyberstalking and harassment laws prohibit monitoring, threats, and gathering private information to threaten or harass individuals online. Theft involves taking property
This document discusses various types of cyber crimes such as hacking, child pornography, denial of service attacks, virus dissemination, cyber terrorism, and software piracy. It provides examples of the earliest recorded cyber crime in 1820 and describes how hackers illegally access computer systems. The text also addresses how the internet enables sexual abuse of children worldwide and how cyber criminals flood networks to deprive victims of access. Five men from Russia and Ukraine were recently charged in the biggest data breach in US history involving theft of over 160 credit card numbers from companies like Nasdaq and JC Penney, costing more than $300 million. Cyber security aims to establish rules to protect against internet attacks through measures like antivirus software, firewalls, and
-The project "Strengthening European Network Centres of Excellence in Cybercrime" (SENTER
project, Reference No HOME/2014/ISFP/AG/7170) is funded by the European Commission under
Internal Security Fund-Police 2014-2020 (ISFP). The main goal of the project is to create a single
point of Reference for EU national Cybercrime Centres of Excellence (CoE) and develop further the
Network of national CoE into well-defined and well-functioning community. More details here: http://www.senter-project.eu/
The document discusses cyber crime and cyber security. It defines cyber crime as crimes committed using computers or online. It discusses the history and evolution of cyber crimes, common types like financial fraud and hacking, and percentages of different crimes. The document also covers cyber threats, security measures, and cyber laws in Pakistan. The National Response Center for Cyber Crime was formed to monitor cyber criminals and Pakistan passed the Prevention of Electronic Crimes Ordinance in 2007 to address cyber crimes, though laws are still being developed.
Cyber crime threatens financial institutions in several ways. Hackers can access personal or sensitive information by breaking into computers. Cyber stalking and identity theft are also problems. Malicious software can steal data or damage systems. Mobile and online banking are growing targets as they handle more transactions electronically. To address cyber crime, financial institutions must implement security features, share threat information, and work with law enforcement internationally since cyber crimes often cross borders. Comprehensive strategies include prevention, investigation, prosecution, and cooperation between public and private sectors.
Phishing is one of the oldest tricks in the book of hackers. But as old as it might be, phishing still remains the most lucrative tool for cybercriminals. In this presentation, we will help you understand about phishing and tell you how you can avoid phishing attacks.
The document discusses various cybersecurity attack vectors and how organizations can protect themselves. It outlines common attack methods like ransomware, malicious code delivery, social engineering, and phishing. It then recommends that organizations conduct regular security audits, establish governance policies, create an incident response plan, and provide cybersecurity education to employees. The document promotes cybersecurity services from Future Point of View including vulnerability testing, forensics, and training to help organizations enhance their protections.
This document discusses cyber security and cyber crimes. It begins with an introduction that defines cyber security and notes the increasing security threats online. It then covers key topics like the meaning of cyber, the need for cyber security, major security problems like viruses and hackers, and solutions for implementing and maintaining security. Specific security issues are explained like viruses, worms, different types of hackers, malware, Trojan horses, and password cracking. The document concludes with sections on cyber security being a shared responsibility and overviews of cyber crime growth, India's cyber security strategy, and some of the biggest cyber attacks in 2020.
This document discusses cybercrime, including definitions, types, causes, and effects. It defines cybercrime as any crime involving a computer or network, with the computer used to commit or be targeted by the crime. Common types of cybercrimes mentioned include hacking, theft of copyrighted material, cyberstalking, identity theft, and child exploitation. Causes cited include economic incentives, ideology, structural factors online, and personal vendettas. Effects can include lost revenue, wasted time, damaged reputations, and reduced productivity. The document also provides an overview of cybercrimes in Nepal, existing laws, and tips for staying safe online such as using strong passwords and updated security software.
This document discusses cyber security. It defines cyber security as technologies and processes designed to protect computers, networks, and data from unauthorized access and attacks over the internet. The three core principles of cyber security are confidentiality, integrity, and availability. Several types of cyber attacks are described such as malware, phishing, and denial of service attacks. Major historical cyber attacks are outlined including the Morris Worm in 1988 and the Anthem hack in 2015 that breached 80 million records. Common attack patterns and measures to prevent cyber attacks like using complex passwords and encryption are also summarized.
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
content explained:-
what is cyber crime
history
categories
types
motives
safety tips
cyber security
advantages and disadvantages
cyber law
cyber law objectives
cyber law in india
conclusion
The document discusses cyber crime and security. It defines cyber crime as criminal activities involving computers, such as hacking, stealing data, and identity theft. The document outlines several types of cyber crimes like hacking, denial of service attacks, software piracy, and cyber terrorism. It also discusses cyber security measures that can help prevent cyber crimes, such as using antivirus software, firewalls, and strong passwords. The document concludes that cyber crimes are increasing and that cyber security is needed to help protect against online threats.
This document discusses cybercrime in detail. It begins by defining cybercrime as illegal activities conducted over the internet or computers, such as theft of data, illegal downloads, and computer viruses. It then discusses different types of cybercrimes such as those against individuals, property, organizations, and society. Specific cybercrimes discussed include email spoofing, spamming, cyberdefamation, and data theft. The document also examines cybercriminals' motives and categorizes them based on their interests. Overall, the document provides a comprehensive overview of the topic of cybercrime.
This document provides an overview of cyber security and cyber crimes. It discusses types of cyber crimes like cyber-enabled crimes (e.g. fraud, phishing), cyber-dependent crimes (e.g. hacking, malware), and extortion. Motivations for cyber crimes include financial gain. The roles of IT departments, users, and attackers are outlined. Common attack methods and vulnerabilities are also described.
This document defines cyber crime and discusses the types, methods, reasons, and perpetrators of cyber crimes. It also provides recommendations for preventing cyber crimes. Specifically:
1. Cyber crime involves using computers as tools or targets for illegal acts like financial crimes, intellectual property theft, and hacking. Common methods are email bombing, illegal access to systems, and data theft.
2. Reasons for cyber crime include the ease of storing and accessing data digitally, the complexity of computer systems, and user negligence.
3. Cyber criminals range from children exploring technology to organized hackers with political motives to disgruntled employees seeking revenge.
4. Prevention strategies include practicing safe online behaviors, using security software,
Module Contents
Introduction, Cybercrime: Definition and Origins of
the word, Cybercrime and information Security, Who
are Cybercriminals? Classifications of Cybercrimes.
How Criminals Plan Them
–Introduction, How Criminals Plan the Attacks, Cybercafé and Cybercrimes, Botnets, Attack Vector
The Indian IT ACT 2000 and amendments.
1. Cybercrime involves criminal activities using computers and the internet, such as identity theft, hacking, and spreading viruses. Common types of cyber attacks include financial fraud, sabotage of networks, and theft of proprietary information.
2. Computer security, also known as cybersecurity, aims to protect computers, networks, programs, and data from theft or damage. It also aims to protect against disruption of computer services. Common computer security threats include hacking, computer viruses, and denial of service attacks.
3. Laws define cybercrimes and provide penalties for illegal computer access, damage to systems, and transmission of viruses. Cybersecurity professionals work to develop security technologies, processes, and practices to defend against cyberattacks and unauthorized
1. Cybercrime involves using computers or the internet to facilitate illegal activities such as identity theft, hacking, and financial fraud. The first recorded cybercrime took place in 1820.
2. Common types of cyber attacks include financial fraud, sabotage of networks or data, theft of proprietary information, unauthorized system access, and denial of service attacks. Hacking, pornography, viruses, and software piracy are also examples of cybercrimes.
3. Managing cybersecurity risks requires understanding threats like criminals and spies, vulnerabilities in systems and supply chains, and potential impacts such as data theft, service disruptions, and damage to infrastructure. Strong defenses, insider monitoring, and rapid patching are keys to risk reduction.
This document discusses cyber crime and provides information on various types of cyber crimes such as financial crimes, email spoofing, and distributed denial of service attacks. It also discusses vulnerabilities of computers that make them susceptible to cyber crimes. Specific cyber crimes discussed in India include hacking, cyber terrorism, and online gambling. The WannaCry ransomware attack of 2017 is described as an example of a major cyber crime. Various tips are provided on protecting yourself from cyber crimes such as using strong passphrases, firewalls, antivirus software, and being wary of emails and online file sharing.
Cyber Crime and Cyber security .
it has been estimated that the cost of crimes committed, annually,would increase from $3 trillion to $6 trillion by 2021. with increase of cyber crimes, the needs for professionls to secure the system from such attacks has risen up.
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
This case study describes a large-scale international cybercrime gang that was busted in Chennai, India. The gang was involved in hacking ATMs using stolen credit card numbers and PINs acquired through phishing. A key member of the gang, Deepak Prem Manwani, was arrested in Chennai while hacking an ATM there. An investigation revealed that the gang had set up fake websites to phish credit card details and PINs from millions of subscribers. They then sold this stolen data to people like Manwani, who used it to hack ATMs. Manwani had hacked ATMs in Mumbai as well. The FBI was already investigating the gang based on complaints from victims in the US. Man
This document provides an overview of cybercrime, including definitions, common types of cybercrimes like hacking, denial of service attacks, phishing and identity theft. It discusses tools used for hacking and describes phishing techniques. It also outlines India's IT Act and key features. Additionally, it mentions some cyberattacks in India and recommends cyber safety actions like installing updates and using antivirus software.
This document discusses cyberspace, cybercrime, and cyber security. It defines cyberspace as the medium of computer systems used for communication, research, and browsing. Cybercrime is defined as crime committed using computers and the internet, where the computer is the object or subject of the crime. Examples of cybercrimes discussed include hacking, child pornography, computer vandalism, denial of service attacks, virus dissemination, software piracy, and phishing. The document also discusses the history of cybercrime and provides examples of hacking tools like keyloggers and sniffers that are used by cybercriminals. It emphasizes the importance of cyber security and provides recommendations for protecting against cybercrime.
This presentation is about the societal impacts. It is strictly based on CLASS 12 Informatics Practices Book aiming to help students and teachers to make learning easy .
CREDITS : pythonmykvs.in
Cyber crime refers to criminal activities conducted through computers and the internet. The document categorizes cyber crimes as those committed against individuals, property, organizations, and society. Examples include email spoofing, spamming, hacking, phishing, and cyber terrorism. The top countries for cyber crimes are the United States, China, and Germany. The document provides tips for cyber security and preventing cyber crimes such as using antivirus software, firewalls, and strong, unique passwords.
This document discusses cyber space, cyber crime, cyber law, and various types of cyber crimes. It defines cyber space as including computers, networks, software, data storage devices, the internet, websites, emails and electronic devices. Cyber crime is any offence committed using a computer. Cyber law deals with legal issues related to computers and the internet, and encompasses areas like cyber crimes, electronic signatures, intellectual property, data protection, and privacy. Various types of cyber crimes discussed include hacking, virus/worm attacks, identity theft, cyberbullying, cyberterrorism, and violations of intellectual property, banking/credit card laws, and e-commerce.
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
This document provides an overview of cybercrimes and legal enforcement in India. It discusses various types of cybercrimes like hacking, data theft, computer viruses. It outlines relevant sections of the Information Technology Act 2000 that pertain to cybercrimes such as Section 43 for civil wrongs, Section 66 for hacking and data alteration, Section 67 for publishing obscene content. The document also discusses challenges in combating cybercrimes through technological measures, investigation techniques, and strengthening legal frameworks. Overall, the document aims to introduce readers to the key issues around cybercrimes and the laws governing them in India.
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
This document provides an overview of cybercrimes and legal enforcement in India. It discusses various types of cybercrimes like hacking, data theft, computer viruses. It outlines relevant sections of the Information Technology Act 2000 that pertain to cybercrimes such as Section 43 for civil wrongs, Section 66 for hacking and data alteration, Section 67 for publishing obscene material. The document also discusses challenges in combating cybercrimes through technological measures, investigation techniques, and strengthening legal frameworks. Overall, the document aims to introduce readers to the topic of cybercrimes and the approaches taken in India to address related legal and enforcement issues.
This document provides an overview of cybercrimes and legal enforcement in India. It discusses various types of cybercrimes like hacking, data theft, computer viruses. It outlines relevant sections of the Information Technology Act 2000 that pertain to cybercrimes such as Section 43 for civil wrongs, Section 66 for hacking and data alteration, Section 67 for publishing obscene content. The document also discusses challenges in combating cybercrimes through technological measures, investigation techniques, and strengthening legal frameworks. Overall, the document aims to introduce readers to the topic of cybercrimes and the approaches taken in India to address related legal and enforcement issues.
The Elphinstonian 1988-College Building Centenary Number (2).pdfMukesh Tekwani
This is the 1988 issue of The Elphinstonian, the annual magazine of Elphinstone College, Mumbai. This is the special issue to commemorate the Century of the Elphinstone College Building in Mumbai.
This document contains lecture notes on various topics related to gravitation and orbital mechanics:
1. It defines Newton's law of gravitation and the gravitational constant G.
2. It discusses the difference between G and g, the acceleration due to gravity, and derives the relation between the two.
3. It then covers concepts like the critical velocity, time period, binding energy, and escape velocity required for a satellite to orbit or escape the gravitational pull of Earth.
4. Additional topics include weightlessness in satellites, variation of g with altitude and depth, and the definition of latitude.
ISCE-Class 12-Question Bank - Electrostatics - PhysicsMukesh Tekwani
This is a 14 page question bank on the chapters of Electrostatics. This is based on the syllabus of most Board exams such as CBSE, ISCE and state boards.
Extremely important topic for Digital electronics, digital circuits, computer architecture and computer science.
Full video is available on Youtube: https://youtu.be/oyOaXqx06pY
This video explains the method of converting a decimal number to a binary number. Many solved examples are given here and also two exercises which you can attempt on your own and then check the answers.
I have also discussed the concept of LSB (least significant bit) and MSB (most significant bit), and also least significant digit (LSD) and most significant digit (MSD).
This topic is important for following courses: class 11 and 12 computer science of all state boards, class 11 and 12 physics, BSc Computer science, BSc IT, MCA (Masters degree in Computer Applications), BTech, BE (First Year), and many competitive examinations.
Free Lectures on YouTube for IGCSE Physics for the syllabus effective 2020-21. These lectures cover the syllabus of IGCSE and a major part of GCSE syllabus also.
1. The Hidden Meaning of Words in Science Question Papers
2. Scientific Notation or Powers of Ten Notation
3. Units and Base Quantities
4. What is Physics?
Refraction and dispersion of light through a prismMukesh Tekwani
This document contains 20 important theory questions about refraction and dispersion of light through a prism. Some key topics covered are:
1) The angle of deviation of light passing through a prism depends on factors like the refracting angle of the prism and the angle of incidence of light.
2) When white light passes through a prism, it disperses into its constituent colors due to the refractive index of the material being different for different wavelengths of light.
3) In the position of minimum deviation, the angles of incidence and refraction of a monochromatic light ray passing through a prism are related to the refracting angle of the prism.
This document contains important theory questions about refraction of light at a plane surface and total internal reflection. It includes 24 multiple choice and derivation questions covering topics such as Snell's law, refractive index, critical angle, total internal reflection, mirages, reflecting prisms, reversing prisms, erecting prisms, optical fibers, and their applications. The document was prepared by Mukesh N Tekwani and provides a comprehensive review of key concepts and formulas relating to the refraction and total internal reflection of light.
This document contains 10 important theory questions about spherical mirrors. It defines key terms used to describe spherical mirrors such as pole, center of curvature, radius of curvature, principal axis, aperture, principal focus, focal length and focal plane. It also derives several important relationships for spherical mirrors, including that the focal length of a concave or convex mirror of small aperture is half the radius of curvature, and the mirror formula relating the focal length to the object and image distances. Finally, it derives the magnification formula for concave mirrors and asks which type of spherical mirror is preferable for observing traffic from a car.
Atom, origin of spectra Bohr's theory of hydrogen atomMukesh Tekwani
This document contains 15 important theory questions about Rutherford's alpha particle scattering experiment, Rutherford's model of the atom, its limitations, Bohr's model of the hydrogen atom, Bohr's postulates, expressions for the stationary and kinetic energy levels of an electron in the hydrogen atom, the energy level diagram for hydrogen showing different emission series, and definitions of terms like Rydberg constant, excitation potential, and ionization potential. The questions are related to key experiments and models in the development of atomic structure and spectra.
Refraction of light at spherical surfaces of lensesMukesh Tekwani
This document contains 15 important theory questions about refraction of light at spherical surfaces and lenses. It includes questions about sign convention in optics, the optical center of a lens, focal length of concave and convex lenses, lens maker's formula, derivation of expressions for refraction at single spherical surfaces and thin lens combinations, linear magnification by a lens, location of a virtual image formed by a convex lens based on focal length, dependence of focal length on wavelength, definition and unit of power of a lens, definition of 1 dioptre, formula for combined power of two lenses in contact, and laws governing image formation by lenses. The questions cover key concepts like derivation, definition, diagrams, formulas, and image formation.
This document outlines the unit-wise weightage for the February 2020 ISCE Class 12 Physics board exam. Unit 3 on Magnetic Effects of Current and Magnetism has the highest weightage at 16. Other highly weighted units include Electromagnetic Induction and Alternating Currents at 14, and Optics at 12. The lowest weighted units are Communication Systems at 2 and Electronic Devices at 8.
What is Cyber Law? Why is cyber security law needed? International cyber law. What is copyright? What are security, controls, privacy, piracy and ethics? Code of ethics for computer professionals. What is cyber insurance?
The document discusses the disadvantages of HTML and the advantages of using XML instead. It notes that HTML lacks structure, syntax checking, and is not suitable for data interchange or describing semantics. XML was designed to store, describe, and transport data, unlike HTML which was designed for display. XML simplifies data sharing and transport between applications since it separates data from presentation and uses plain text. It also allows for international character support and makes data more available and reusable.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
2. For Whom ?
This presentation is based on the lectures delivered for
students of B. Voc. (Semester 2 ) Computing Skills (TISS) at
HMMRA, Vile Parle, Mumbai during January – February 2019
Contents of this presentation may also be useful to other
students pursuing similar courses.
--- Prof. Mukesh N Tekwani, Mumbai
mukeshtekwani@outlook.com
2
3. Cyber?
1. The term Cyberspace was first coined by William
Gibson in 1982, in his novel Neuromancer.
2. Cyber - relating to computers, information technology
and virtual reality
3
4. What is Cyber Crime?
1. Any illegal activity committed using a computer and / or
Internet
2. Cybercrime is - “unlawful acts wherein the computer is
either a tool or a target or both”.
3. Cyber crime is an extension of existing illegal activities
4
5. Causes of Cyber Crime
1. Internet makes it easy to do a cyber crime
2. ‘Crime at a distance’ - the perpetrator does not have to be
at the scene of the crime
3. The criminal can be faceless – till the crime is solved, if it is
solved!
4. Conviction rates are fairly low as technology makes the
detection process difficult
5. Low risk – high returns – low convictions => this has led to
increase in cyber crime
5
6. Basic Terminology - 1
1. Threat – An event or an action that has got the ability to
violate the security or to compromise the system
2. Exploit – a way to breach the security of a machine
through a loophole or a vulnerability
3. Vulnerability – A weakness in the design or existence of a
loop hole that could lead to undesirable or unexpected
events that could compromise the security
6
7. Basic Terminology - 2
4. Attacker – Any individual who compromises the security of
a machine in order to steal, manipulate or cause
destruction of data
5. Attack – The action that is performed by an attacker that
would harm the system or the information stored in it
6. Data Theft – Action of stealing data/information from the
victim’s machine
7
8. Types of Cyber Crimes
1. Crimes against Persons – stalking, nuisance, harassment,
defamation
2. Crimes against property – data, information, computer,
communication device, damage to source code
3. Crimes against government – cyber terrorism, cyber war
4. Social media crimes
8
9. Types of Cyber Crimes
1. Traditional crimes – fraud, cheating
2. Identity Theft
3. Banking frauds
4. Property Crimes – infiltration of computers with malicious
software – through email attachments, websites.
5. Theft of bandwidth
6. Crimes against businesses
9
10. Types of Cyber Crime
7. Misuse of Social Media Platforms, spreading of fake news
8. Defamation
9. Threats
10. Pornography
11. Hacking
12. Planting viruses
13. IPR thefts – Intellectual Property Rights
14. Ransomware
15. Tech support scams (non-existing malware, etc)
10
11. Challenges
1. New technologies
2. New threats
3. Complex networks
4. New vulnerabilities
5. Limited focus on security
6. Limited security expertise
11
12. Cyber Crime Against Individual
- Cyber stalking – use of technology to harass someone e.g.
false accusations,
- Distributing pornography
- Trafficking
- Grooming – harassment or seduction of a minor by an adult
- Spying – obtaining secrets without the permission of the
holder of information (reading another person’s email)
- Juice jacking
12
14. Cyber Crime - Hacking
- Hacking
- A person’s
computer is
broken into so that
the personal and
sensitive
information can be
stolen
14
15. Cyber Crime - Hacking
- Indian Websites hacked in recent past:
- 2016 – 33,147
- 2017 – 30,067
- 2018 – 15,779
- The Indian Computer Emergency Response Team (CERT-In)
issues alerts and advisories regarding latest cyber threats
and countermeasures.
15
16. Cyber Crime - Hacking
- Hacking
- The hacker uses a variety of software tools to get into a
computer system.
- The victim may not even be aware that his system has
been hacked
- Ethical hacking is a different concept – here organisations
may employ hacker to test their systems for weakness or
vulnerabilities
16
17. Cyber Crime - Theft
- Theft
- Violation of copyright laws
- Downloading music for commercial purpose
- Download images for commercial purpose
- Download games and movies without paying for them
- Some websites encourage software piracy and these
websites are now being shut down
- REMEMBER!!! – Downloading software, music, movies
and games without paying for it is a Theft
17
18. Cyber Crime - Stalking
- Stalking
- Online harassment
- Victim is sent numerous
messages/emails
- The stalker knows the victim
- May not be doing offline
stalking
- Remember these words –
follow, shadow, go after, be
after, trail, follow
18
19. Cyber Crime – Identity Theft
- Identity Theft
- Deliberate use of someone’s identity
- Someone steals your identity – name, address,
- Passport details
- That ’someone’ becomes you
- Then he/she can pretend to be you, and misuse your bank
accounts, credit cards, debit card and other sensitive
information
- He/she can buy things online in the victims name
- Causes financial loss and spoils the credit history 19
20. Cyber Crime – Identity Theft
- How do Attackers carry out Identity Theft?
- Phishing – fake sites are created by fraudsters who trick
victims into giving out their information
- Social Engineering – art of manipulating human emotions for
getting sensitive information
- Hacking – If victim’s computer or mobile is compromised,
hackers will get maximum information
- Personal data Theft – credit card info, checks, PAN card and
Aadhar card details.
20
21. Cyber Crime – Identity Theft
- What to do?
- Contact banks immediately
- Freeze your bank accounts
- Change your passwords
- Block credit / debit cards
- FIR at nearest police station
- Contact your mobile service provider and get a new SIM
card in your name
21
22. Cyber Crime – Identity Theft
- Frauds
- Financial frauds
- Gain control over bank accounts
- Get loans based on your identity
- Credit card frauds
- Mobile phone frauds
- Frauds pertaining to government documents
22
23. Cyber Crime – Malicious Software
- Malicious Software or Malware
- Such software is intentionally designed to cause damage
- These are software or programs that are used to disrupt a
network.
- Such software can be used to
- steal data
- Cause damage to a server
- Slow down or bring down a network
23
24. Cyber Crime – Phishing
- Phishing
- The thief (phisher) sends a deceptive email to the
recipient tricking him into providing personal account
details (username/password).
- The phisher will provide the user a link to “sign in” at an
official-looking website,
- This site looks almost identical to a real vendor’s website
with similar design but built specifically to collect personal
information.
- That information will be used against the victim later.
24
26. Cyber Crime – Vishing
- Vishing
- Vishing uses phone to extract data through voice calls
- The visher will make cold calls to the victim posing as a
representative of the victim’s bank, income tax dept., or
insurance company
- Other times these calls will be automated with voice
prompts.
- The plan is to gain access to the victim’s financial and
personal information.
26
31. Cyber Crime – Mobile Wallet Frauds
- Transfer money from one wallet to another.
- Or, attacker will purchase goods such as mobile phone,
etc. Later they sell this to others.
- Never store a large amount on money in mobile wallet
- Never store credit/debit card details in your mobile wallet.
31
32. Cyber Crime – Debit/Credit Card Frauds
- Don’t keep information about your credit/debit card in
your mobile
- Remember the CVV number on your card and remove it
from the card itself.
- Money stolen from your mobile wallets can be stored in
other stolen wallets and in that case you would become
not just a victim but even the perpetrator
- Never allow apps to read your SMS – else OTP can be read
and transferred
- Don’t use public Wi-Fi to access secure data – banks, etc
32
41. Passwords
- 123456
- password
- 123456789
- Abc123
- admin
- !@#$%^
- Godhelpme
- Donald
- qwerty123
- Use passphrases of 12 characters or
more
- Use different password for each site
- Change password frequently
- Song/phrase/….
41
42. Never Respond To These
- Free credit card offers
- Credit card offers
- Lottery schemes from ANYWHERE in the world
- ‘RBI’ lottery
- Income Tax department ‘REFUND’ notice
- ‘Loan is Ready’ emails
- ‘Friendship’ emails
- Bank ‘confirmation email’
- ‘Your email account will be blocked’ emails
- Government jobs emails – Jobs? Government? Joking??
42
43. Safe Disposal of Old Hardware
- Companies sell their old hardware – disks, servers,
without wiping sensitive data on them.
- These servers contain credit card details, health records,
source code for controlling fire-fighting equipment, street
lights, etc
43
44. Cyber Crime – Cyber Terrorism
- Cyber Terrorism
- Use of Internet-based attacks in terrorist activities
- Large scale disruption of computer networks
- Use computer viruses to disable computers
- DOS attacks (Denial of Service)
44
45. Cyber Crime Against An Entire Country
- Business Insider (India), Dec 22, 2018
- Gatwick Airport – Britain’s 2nd busiest airport, Europe’s 8th.
- Brought to a standstill for 36 hours by – a drone and 2
people.
- What they did? – illegal flying of drones near the airport
- Army had to be called in.
45
46. Cyber Crime Against An Entire Country
- What happens if hackers take an entire country offline?
- Lights off
- Power supply disrupted
- Communications
- Transport – rail, air affected
- If Temperature sensor hacked in a factory, hacker can set
up the place on fire
- Cyber terrorism becomes a means of mass destruction
- Enemy is hidden so whom to you attack?
46
47. Cyber Crime Against An Entire Country
- In December 2017, 3 men caused the largest internet outage in
history - a distributed "denial of service" attack
- blacked out the web across most of the US and large chunks of
Northern Europe for about 12 hours.
- How did they do it? They had disabled Dyn, a company that
provides Domain Name System (DNS) services - the web's
directory of addresses, basically - to much of the Internet.
47
48. Cyber Crime Against An Entire Country
In April 2018, the African country of
Mauritania was taken offline for two days
when someone cut the single undersea
cable that serves its internet.
Who did this ?
Neighbouring country Sierra Leone
48
49. Cyber Crime - Ransomware
In May 2017, Wannacry virus affected Britain’s
National Health Service
It locked up user’s computer and demanded a ransom
By December 2017, the US govt confirmed that the
North Korean government was responsible for the
attack.
49
51. What the Internet Knows About You
“Google Will Soon Know You Better Than Your Spouse Does”
– Ray Kurzwel, Director of Engineering at Google
51
52. Top Global Risks in Terms of Likelihood
Extreme Weather events1
Natural Disasters2
Cyber attacks3
Data fraud or Theft4
52
53. Cyber War
- Cyber War is defined as “ the use of computer technology to
disrupt the activities of a state or organisation”. Also called
“bloodless war”
- Estonia – 2007
- Iran – 2010 – Stuxnet virus – affected Iranian nuclear
weapons plant. This code was installed by using USB key !
- Cyberwarfare is cheap – compared to building nuclear
missiles
- It can affect all communications, bring down power grid
53
54. Case Study – Cyber Attacks of Estonia
- April 27, 2007 – Estonia hit by a massive cyber DDOS
(Distributed Denial of Service) attack
- Online services of banks, govt organisations, media houses,
police were taken down due to unprecedented levels of internet
traffic
- Huge amounts of automated online requests swamped the
servers for 2 weeks
- Result?
- ATM and banking services x
- Govt employees could not communicate on email
- Broadcasters and newspapers could not deliver news 54
55. TEST - 1
- Pick a term that describes the following:
data, cyber, vulnerability, phishing, wishing, hacking, vishing,
information, exploit, juice jacking, threat
1. Relating to Internet _________
2. Roll No : 386 __________
3. Way to breach security _________
4. Weakness in the system _________
5. Action that can violate the security of a system ________
6. Stealing data while charging a phone ___________
55
56. TEST - 2
- Classify the following crimes by writing them under appropriate
columns:
Damage to source code, stalking, cyber terrorism, defamation,
damage to data, damage to communication devices, cyber war
identity theft, grooming
Crime against Persons Crimes against
Property
Crimes against
government
56
57. TEST - 3
Describe these terms in atleast 5 sentences
- Hacking
- Phishing
- Vishing
- Cyber terrorism
- Safe passwords
57
58. TEST - 4
In your own words, explain the reasons behind cyber crime
58
59. TEST - 5
CONGRATULATIONS!!!
You have been appointed as the Chief Information Security Officer
of the multinational bank FBN Bank.
What advice will you give to your bank customers to protect their
accounts?
59
60. TEST - 6
In your words describe cyber stalking and child soliciting
60