Information communication technology has become integral to daily life and transformed how people communicate, socialize, and do activities online. However, increased internet usage has also led to rising cybercrimes. The document discusses definitions of cybercrimes and cyberspace, different types of cybercrimes like those against individuals, property, organizations, and society. It provides examples of cybercrimes and relevant laws. Proper implementation of laws like the Information Technology Act 2000 can help curb the growing threat of cybercrimes by making cyberspace more secure.
This slide presents the evolution of Computers and the internet, along with the advantages of eGovernance. This slide mainly concentrates on explaining various Cyber Crime and its legal provisions in India.
Cyber Crime has become most concerned topic in India. What are the rules & regulations of cyber world are highlighted along with precautions to taken while using social media and online activities
Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
This slide presents the evolution of Computers and the internet, along with the advantages of eGovernance. This slide mainly concentrates on explaining various Cyber Crime and its legal provisions in India.
Cyber Crime has become most concerned topic in India. What are the rules & regulations of cyber world are highlighted along with precautions to taken while using social media and online activities
Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
CYBERSPACE
CYBER POWER
INTERNET
CYBER-ATTACK
INDIA AND PAKISTAN CYBER ATTACKS
TYPES OF CYBER CRIME
Hypotheses in the Research
Literature on the Influence of Mass Media on Criminal Behavior
Technology-Related Risk Factors for Criminal Behavior
COPYCAT CRIME:
CYBER SECURITY
SAFETY TIPS FOR CYBER CRIME
Cyber crime refers to criminal activities Carried out by means of computers Or the internet.
All cyber crimes are committed under an electronic communication medium or space known as cyber space.
Cyber Crime and Security (Ways to protect yourself on the internet)AshishPanda24
This is an educational and self-awareness ppt explaining what is and actually qualifies as a cybercrime along with what are the ways we can protect ourselves from this!
Defining Cybercrime
Defining Cybercrime (continued)
CYBER CRIMES
Three Categories of Cybercrime
Examples of the Three Categories of Cybercrime
CYBER CRIMES VICTIMIZED
CYBER CRIME IN INDIA(PICTORIAL REPRESENTATION)
CYBER CRIMES IN INDIA (CONT.)
SAFETY TIPS TO AVOID CYBERCRIME
THANK YOU
CYBERSPACE
CYBER POWER
INTERNET
CYBER-ATTACK
INDIA AND PAKISTAN CYBER ATTACKS
TYPES OF CYBER CRIME
Hypotheses in the Research
Literature on the Influence of Mass Media on Criminal Behavior
Technology-Related Risk Factors for Criminal Behavior
COPYCAT CRIME:
CYBER SECURITY
SAFETY TIPS FOR CYBER CRIME
Cyber crime refers to criminal activities Carried out by means of computers Or the internet.
All cyber crimes are committed under an electronic communication medium or space known as cyber space.
Cyber Crime and Security (Ways to protect yourself on the internet)AshishPanda24
This is an educational and self-awareness ppt explaining what is and actually qualifies as a cybercrime along with what are the ways we can protect ourselves from this!
Defining Cybercrime
Defining Cybercrime (continued)
CYBER CRIMES
Three Categories of Cybercrime
Examples of the Three Categories of Cybercrime
CYBER CRIMES VICTIMIZED
CYBER CRIME IN INDIA(PICTORIAL REPRESENTATION)
CYBER CRIMES IN INDIA (CONT.)
SAFETY TIPS TO AVOID CYBERCRIME
THANK YOU
Cyber crime a potential threat and remediesIJARIIT
Cybercrime is an illegal activity performed by an individual or by a group of experts in computer technology using
the Internet. It ranges from stealing money online from an individual to big corporate using the internet. In the present era of
information technology, the computer has made the life easy. People use computer or mobile to perform various jobs on the
Internet. So it is necessary to know how to perform various transactions on the internet safely. Everyone is prone to the attack
from the cyber criminals. One must be aware and should have knowledge of cybercrime.
What are cybercrimes? How cybercrime works?FarjanaMitu3
Today is the time of the internet, computers, and digital technology.
And, in this age of the Internet, we spend much of our lives online. However, there are many reasons why the internet is so fun and popular.
Getting the latest news through various websites, talking to our loved ones from anywhere, chatting and communicating via video call, shopping online through the internet, getting accurate information on any subject, watching videos for entertainment, playing online games, and online bills. Today it has become possible to do almost all kinds of work like payment easily through the internet.
Honestly, I think the internet is a contribution to us
Simply, if there is no complete internet for one day, it can have a lot of impact on public life.
At any given time, billions of people are active on the Internet and use various websites or applications to access the Internet on their mobile phones or computers.
In this case, there are many people who use computers and the internet to steal their personal information, cheat, and extort money from these "online traffic" or "online internet users" through various illegal means. More other crimes.
Thus, the crimes of cheating, privacy, and data theft or misuse of data online through a mobile, computer, and internet are called cyber crime or cybercrime. And, those who commit this kind of cybercrime are called cybercriminals. There are different types of cybercrime on the internet. This means that cybercriminals can deceive you through various illegal means online. You may be the next victim if you are not careful when using the Internet.
What are cybercrimes?
Cyber crime is an activity done using computers and internet.
Cyber forensics is the science of collecting, examining, analyzing and reporting electronic evidence.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
2. Information Communication technology has become an integral part of our day to day
life. It has just transformed the way we communicate; make friends, share updates,
play games, and do shopping and so on. The technology has impacted most aspect of
our day to day life.
Our new generation is getting exposure to cyber space at a very young age. More and
more people are investing time online to play games, makes friends, and use social
networking sites and so on. In fact with smart phones access to social networking,
online games, shopping etc. has increased significantly. The cyber space connects us
virtually with crores of online users from across the globe. With increasing use of
cyber space, cybercrimes are also increasing rapidly.
3. The term “cyberspace” was first used by the cyberpunk science fiction
author William Gibson.
Cyberspace is the electronic medium of computer networks, in which
online communication taken place and where individuals can interact,
exchange ideas, share information, provide social support, conduct
business, direct actions, create artistic media, play games, engage in
political discussion, and so on.
4. The first recorded cybercrime took place in the year 1820.
Cyber Crime may be said to be those species of which, genus is the
conventional crime, and where either the computer is an object or
subject of the constituting crime.
According to UNO Expert recommendations, the term of
“cybercrimes” covers any crime committed by using computer
system or networks, within their framework or against them.
US Department of Justice broadly refers to cyber crimes as “forms
of crimes that involve computers and networks”.
5. Professor S.T. Viswanathan has given three definitions in his book The Indian Cyber
Laws with Cyber Glossary is as follows -
“Any illegal action in which a computer is the tool or object of the crime i.e. any
crime, the means or purpose of which is to influence the function of a computer”.
“Any incident associated with computer technology in which a victim suffered or
could have suffered loss and a perpetrator, by intention, made or could have made
a gain”
“Computer abuse is considered as any illegal, unethical or unauthorized behavior
relating to the automatic processing and transmission of data.”
In simple words Cyber Crime means unlawful acts wherein the computer is
either a tool or a target or both.
6. 1. Cyber Crime against Individual
2. Cyber Crime against Property
3. Cyber Crime against Organization
4. Cyber Crime against Society at large
7. Harassment via e-mail
Cyber Stalking
Dissemination of Obscene materials
Defamation
Unauthorise Access of computer system
E-mail spoofing
Cheating & Fraud
8. Computer Vandalism
Transmitting Virus
Intellectual Property Crimes
Internet time theft
9. Unauthorise access over Computer System/Hacking
Denial of Service
Email bombing
Salami Attack
Logic bomb
Trojan Horse
Data Diddling
10. Cyber Pornography
Financial Crimes
Cyber Terrorism
Sale of illegal Articles
Online Gambling
Forgery
11. Information Technology Act 2000
Sec. 65, Sec. 66, Sec. 66B, Sec. 65C, Sec. 66 D Sec. 66E
Sec. 66F Sec. 67 Sec. 67A Sec. 67B Sec. 67C Sec. 68 69
Sec. 69A Sec. 69B Sec. 70A Sec. 70B Sec. 71, Sec. 72, Sec.
72A, Sec. 73 , Sec. 74
Indian Penal Code 1860
Sec. 503, Sec. 499, Sec. 463, Sec. 420, Sec. 463, Sec. 383,
Sec.500
12. Online Defamation
SMC Pneumatics (India) Pvt ltd v Jogesh Kwata
Shreya Singhal v. UOI
Data mining or corporate espionage
Abhinav Gupta v. State of Haryana
Phishing
Shri Umashankar Sivasubramanian v. ICICI Bank
Cyber stalking
Unknown v. Jawaharlal Nehru University
Computer Forgery
Abdul Kareem Telgi scam
Parliament Attack case
Hate Speech
Sandeep Varghese v. State of Kerala
Piracy of music, films and other
copyrighted materials
Supercasette Industries v. My space inc
13. 1) Education
2) Use a firewall
3) Click with caution
4) Practice safe surfing
5) Practice safe shopping
6) Use comprehensive security software and keep your system updated
7) Secure your wireless network
8) Use strong passwords
9) Use common sense
10) Be suspicious
14. 11) Block spyware attacks
12) Be Social-Media Savvy
13) Secure your Mobile Devices
14) Protect your Data
15) Protect your e-identity
16) Avoid being scammed
17) Call the right person for help
18) National Cyber Crime Reporting Portal:
https://cybercrime.gov.in/
15. The Information Technology Act 2000 incorporates within
its understanding the various cyber offences that the world
is under the threat of in the contemporary era. Proper and
timely implementation of the Act may help to curb the
cyber menace and also make the cyber space a more
secure, safe and easy space for storage, transactions and
definitely sharing. Its proper interpretation and
implementation is what is the need of the hour.