SlideShare a Scribd company logo
Information Communication technology has become an integral part of our day to day
life. It has just transformed the way we communicate; make friends, share updates,
play games, and do shopping and so on. The technology has impacted most aspect of
our day to day life.
Our new generation is getting exposure to cyber space at a very young age. More and
more people are investing time online to play games, makes friends, and use social
networking sites and so on. In fact with smart phones access to social networking,
online games, shopping etc. has increased significantly. The cyber space connects us
virtually with crores of online users from across the globe. With increasing use of
cyber space, cybercrimes are also increasing rapidly.
The term “cyberspace” was first used by the cyberpunk science fiction
author William Gibson.
Cyberspace is the electronic medium of computer networks, in which
online communication taken place and where individuals can interact,
exchange ideas, share information, provide social support, conduct
business, direct actions, create artistic media, play games, engage in
political discussion, and so on.
The first recorded cybercrime took place in the year 1820.
Cyber Crime may be said to be those species of which, genus is the
conventional crime, and where either the computer is an object or
subject of the constituting crime.
According to UNO Expert recommendations, the term of
“cybercrimes” covers any crime committed by using computer
system or networks, within their framework or against them.
US Department of Justice broadly refers to cyber crimes as “forms
of crimes that involve computers and networks”.
Professor S.T. Viswanathan has given three definitions in his book The Indian Cyber
Laws with Cyber Glossary is as follows -
“Any illegal action in which a computer is the tool or object of the crime i.e. any
crime, the means or purpose of which is to influence the function of a computer”.
“Any incident associated with computer technology in which a victim suffered or
could have suffered loss and a perpetrator, by intention, made or could have made
a gain”
“Computer abuse is considered as any illegal, unethical or unauthorized behavior
relating to the automatic processing and transmission of data.”
In simple words Cyber Crime means unlawful acts wherein the computer is
either a tool or a target or both.
1. Cyber Crime against Individual
2. Cyber Crime against Property
3. Cyber Crime against Organization
4. Cyber Crime against Society at large
 Harassment via e-mail
 Cyber Stalking
 Dissemination of Obscene materials
 Defamation
 Unauthorise Access of computer system
 E-mail spoofing
 Cheating & Fraud
 Computer Vandalism
 Transmitting Virus
 Intellectual Property Crimes
 Internet time theft
 Unauthorise access over Computer System/Hacking
 Denial of Service
 Email bombing
 Salami Attack
 Logic bomb
 Trojan Horse
 Data Diddling
 Cyber Pornography
 Financial Crimes
 Cyber Terrorism
 Sale of illegal Articles
 Online Gambling
 Forgery
 Information Technology Act 2000
Sec. 65, Sec. 66, Sec. 66B, Sec. 65C, Sec. 66 D Sec. 66E
Sec. 66F Sec. 67 Sec. 67A Sec. 67B Sec. 67C Sec. 68 69
Sec. 69A Sec. 69B Sec. 70A Sec. 70B Sec. 71, Sec. 72, Sec.
72A, Sec. 73 , Sec. 74
 Indian Penal Code 1860
Sec. 503, Sec. 499, Sec. 463, Sec. 420, Sec. 463, Sec. 383,
Sec.500
 Online Defamation
SMC Pneumatics (India) Pvt ltd v Jogesh Kwata
Shreya Singhal v. UOI
 Data mining or corporate espionage
Abhinav Gupta v. State of Haryana
 Phishing
Shri Umashankar Sivasubramanian v. ICICI Bank
 Cyber stalking
Unknown v. Jawaharlal Nehru University
 Computer Forgery
Abdul Kareem Telgi scam
Parliament Attack case
 Hate Speech
Sandeep Varghese v. State of Kerala
 Piracy of music, films and other
copyrighted materials
Supercasette Industries v. My space inc
 1) Education
 2) Use a firewall
 3) Click with caution
 4) Practice safe surfing
 5) Practice safe shopping
 6) Use comprehensive security software and keep your system updated
 7) Secure your wireless network
 8) Use strong passwords
 9) Use common sense
 10) Be suspicious
 11) Block spyware attacks
 12) Be Social-Media Savvy
 13) Secure your Mobile Devices
 14) Protect your Data
 15) Protect your e-identity
 16) Avoid being scammed
 17) Call the right person for help
 18) National Cyber Crime Reporting Portal:
https://cybercrime.gov.in/
The Information Technology Act 2000 incorporates within
its understanding the various cyber offences that the world
is under the threat of in the contemporary era. Proper and
timely implementation of the Act may help to curb the
cyber menace and also make the cyber space a more
secure, safe and easy space for storage, transactions and
definitely sharing. Its proper interpretation and
implementation is what is the need of the hour.
“Be Safe, Brows Safe,
Be Cyber Smart,
Be Cyber Safe.”
Cyber crimes its classifications and preventions

More Related Content

What's hot

Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 
Cyberspace
CyberspaceCyberspace
Cyberspace
Utchi
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
Dharmik Navadiya
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
Beckusq
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
PsychoticBanda
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Tarseam Singh
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Revolucion
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital DivideDeniz Cengiz
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
Cyber Crime and Security (Ways to protect yourself on the internet)
Cyber Crime and Security (Ways to protect yourself on the internet)Cyber Crime and Security (Ways to protect yourself on the internet)
Cyber Crime and Security (Ways to protect yourself on the internet)
AshishPanda24
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
PrabhatChoudhary11
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Darshan Vithani
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school level
Abhinav Saxena
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
Home
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 

What's hot (20)

Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security (Ways to protect yourself on the internet)
Cyber Crime and Security (Ways to protect yourself on the internet)Cyber Crime and Security (Ways to protect yourself on the internet)
Cyber Crime and Security (Ways to protect yourself on the internet)
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school level
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 

Similar to Cyber crimes its classifications and preventions

Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
IJARIIT
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
VipinRawat52
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
sunanditaAnand
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
Dr. Arun Verma
 
Cybercrime
CybercrimeCybercrime
Cybercrime
dhru shah
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 

Similar to Cyber crimes its classifications and preventions (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 

Recently uploaded

Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
johncavitthouston
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 

Recently uploaded (20)

Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 

Cyber crimes its classifications and preventions

  • 1.
  • 2. Information Communication technology has become an integral part of our day to day life. It has just transformed the way we communicate; make friends, share updates, play games, and do shopping and so on. The technology has impacted most aspect of our day to day life. Our new generation is getting exposure to cyber space at a very young age. More and more people are investing time online to play games, makes friends, and use social networking sites and so on. In fact with smart phones access to social networking, online games, shopping etc. has increased significantly. The cyber space connects us virtually with crores of online users from across the globe. With increasing use of cyber space, cybercrimes are also increasing rapidly.
  • 3. The term “cyberspace” was first used by the cyberpunk science fiction author William Gibson. Cyberspace is the electronic medium of computer networks, in which online communication taken place and where individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on.
  • 4. The first recorded cybercrime took place in the year 1820. Cyber Crime may be said to be those species of which, genus is the conventional crime, and where either the computer is an object or subject of the constituting crime. According to UNO Expert recommendations, the term of “cybercrimes” covers any crime committed by using computer system or networks, within their framework or against them. US Department of Justice broadly refers to cyber crimes as “forms of crimes that involve computers and networks”.
  • 5. Professor S.T. Viswanathan has given three definitions in his book The Indian Cyber Laws with Cyber Glossary is as follows - “Any illegal action in which a computer is the tool or object of the crime i.e. any crime, the means or purpose of which is to influence the function of a computer”. “Any incident associated with computer technology in which a victim suffered or could have suffered loss and a perpetrator, by intention, made or could have made a gain” “Computer abuse is considered as any illegal, unethical or unauthorized behavior relating to the automatic processing and transmission of data.” In simple words Cyber Crime means unlawful acts wherein the computer is either a tool or a target or both.
  • 6. 1. Cyber Crime against Individual 2. Cyber Crime against Property 3. Cyber Crime against Organization 4. Cyber Crime against Society at large
  • 7.  Harassment via e-mail  Cyber Stalking  Dissemination of Obscene materials  Defamation  Unauthorise Access of computer system  E-mail spoofing  Cheating & Fraud
  • 8.  Computer Vandalism  Transmitting Virus  Intellectual Property Crimes  Internet time theft
  • 9.  Unauthorise access over Computer System/Hacking  Denial of Service  Email bombing  Salami Attack  Logic bomb  Trojan Horse  Data Diddling
  • 10.  Cyber Pornography  Financial Crimes  Cyber Terrorism  Sale of illegal Articles  Online Gambling  Forgery
  • 11.  Information Technology Act 2000 Sec. 65, Sec. 66, Sec. 66B, Sec. 65C, Sec. 66 D Sec. 66E Sec. 66F Sec. 67 Sec. 67A Sec. 67B Sec. 67C Sec. 68 69 Sec. 69A Sec. 69B Sec. 70A Sec. 70B Sec. 71, Sec. 72, Sec. 72A, Sec. 73 , Sec. 74  Indian Penal Code 1860 Sec. 503, Sec. 499, Sec. 463, Sec. 420, Sec. 463, Sec. 383, Sec.500
  • 12.  Online Defamation SMC Pneumatics (India) Pvt ltd v Jogesh Kwata Shreya Singhal v. UOI  Data mining or corporate espionage Abhinav Gupta v. State of Haryana  Phishing Shri Umashankar Sivasubramanian v. ICICI Bank  Cyber stalking Unknown v. Jawaharlal Nehru University  Computer Forgery Abdul Kareem Telgi scam Parliament Attack case  Hate Speech Sandeep Varghese v. State of Kerala  Piracy of music, films and other copyrighted materials Supercasette Industries v. My space inc
  • 13.  1) Education  2) Use a firewall  3) Click with caution  4) Practice safe surfing  5) Practice safe shopping  6) Use comprehensive security software and keep your system updated  7) Secure your wireless network  8) Use strong passwords  9) Use common sense  10) Be suspicious
  • 14.  11) Block spyware attacks  12) Be Social-Media Savvy  13) Secure your Mobile Devices  14) Protect your Data  15) Protect your e-identity  16) Avoid being scammed  17) Call the right person for help  18) National Cyber Crime Reporting Portal: https://cybercrime.gov.in/
  • 15. The Information Technology Act 2000 incorporates within its understanding the various cyber offences that the world is under the threat of in the contemporary era. Proper and timely implementation of the Act may help to curb the cyber menace and also make the cyber space a more secure, safe and easy space for storage, transactions and definitely sharing. Its proper interpretation and implementation is what is the need of the hour.
  • 16. “Be Safe, Brows Safe, Be Cyber Smart, Be Cyber Safe.”