This document provides an overview of cyber space and the opportunities and threats it presents. It discusses the evolution of cyber space and the internet. It defines internet of things (IoT) and provides examples of how IoT is used in daily life like e-governance services, social media, and mobile apps. It also outlines some of the threats in cyber space like cyber crimes, financial fraud, hacking, and piracy. It emphasizes that awareness is the best tool to avoid becoming a victim of cyber crimes.
Cyber security is important to protect electronic data and online services from criminal or unauthorized use. There are various security problems in the cyber field like cyber attacks, viruses, hackers, malware, and trojan horses. Some major cyber attacks in India include the Cosmos Bank attack, Aadhaar software hack, ATM system hack, and personal data breaches at companies like JustDial. To prevent cyber attacks, organizations should educate employees, keep software updated, perform security testing, and limit employee access to sensitive data. Careers in cyber security include roles like cyber security engineers, penetration testers, and security analysts.
Cyber terrorism involves using computers and technology to intimidate or harm people for political or religious goals. It differs from physical terrorism in that there is less risk of being caught and tracked online. Potential cyber terrorists include crackers, white hat hackers, and script kiddies. Factors contributing to cyber terrorism are dependence on technology, lack of security understanding, lack funding for security, and difficulty tracking online criminals. Common cyber attacks include information theft, credit card theft, hacking, and threatening infrastructure. Preventing cyber terrorism requires cooperation between agencies, prioritizing security, and reporting cyber crimes.
Password Cracking is a technique to gain the access to an organisation.
In this slide, I will tell you the possible ways of cracking and do a live example for Gmail Password Cracking.
Cyber crime & security final tapanTapan Khilar
This document discusses various types of cybercrimes and the relevant laws in India. It defines cybercrimes as crimes that involve computers and the internet. The key points covered are:
- Types of cybercrimes include hacking, phishing, computer viruses, cyber pornography, denial of service attacks, and software piracy.
- The Indian IT Act 2000 is the main law governing cybercrimes and has sections dealing with hacking, data alteration, unauthorized access, and publishing obscene material.
- Other relevant laws include the IPC for offenses like fraud, forgery and criminal breach of trust.
- Investigating cybercrimes involves computer forensics to preserve digital evidence that can be accepted in
The document discusses cyber terrorism, including defining it, describing its features and forms, discussing tools and methods used, and providing examples. Specifically, it defines cyber terrorism as the use of computers and telecommunications to disrupt services and cause fear by confusing populations to influence government agenda. Targets may include infrastructure like power plants. Challenges include difficulty identifying attackers due to lack of boundaries and rapidly evolving techniques.
This document discusses social engineering techniques used by attackers to trick people into divulging sensitive information or performing actions. It defines key terms and explains why social engineering is a threat even for organizations with strong technical security controls. Common social engineering attack methods are described in detail, including phishing emails, phone calls, dropping infected USB drives, and impersonation. The document emphasizes that education is needed to help people recognize and avoid social engineering tactics.
This document provides an introduction to cybercrime, including definitions of key terms, classifications of cybercrimes, and descriptions of common cybercrime activities. It defines cybercrime as illegal activities that target computer systems and data. Cybercrimes are categorized as those against individuals, property, organizations, and society. Examples include phishing, spamming, hacking, software piracy, and cyberterrorism. Cybercriminals are also classified as those seeking recognition, financial gain, or insider revenge.
Cyber security is important to protect electronic data and online services from criminal or unauthorized use. There are various security problems in the cyber field like cyber attacks, viruses, hackers, malware, and trojan horses. Some major cyber attacks in India include the Cosmos Bank attack, Aadhaar software hack, ATM system hack, and personal data breaches at companies like JustDial. To prevent cyber attacks, organizations should educate employees, keep software updated, perform security testing, and limit employee access to sensitive data. Careers in cyber security include roles like cyber security engineers, penetration testers, and security analysts.
Cyber terrorism involves using computers and technology to intimidate or harm people for political or religious goals. It differs from physical terrorism in that there is less risk of being caught and tracked online. Potential cyber terrorists include crackers, white hat hackers, and script kiddies. Factors contributing to cyber terrorism are dependence on technology, lack of security understanding, lack funding for security, and difficulty tracking online criminals. Common cyber attacks include information theft, credit card theft, hacking, and threatening infrastructure. Preventing cyber terrorism requires cooperation between agencies, prioritizing security, and reporting cyber crimes.
Password Cracking is a technique to gain the access to an organisation.
In this slide, I will tell you the possible ways of cracking and do a live example for Gmail Password Cracking.
Cyber crime & security final tapanTapan Khilar
This document discusses various types of cybercrimes and the relevant laws in India. It defines cybercrimes as crimes that involve computers and the internet. The key points covered are:
- Types of cybercrimes include hacking, phishing, computer viruses, cyber pornography, denial of service attacks, and software piracy.
- The Indian IT Act 2000 is the main law governing cybercrimes and has sections dealing with hacking, data alteration, unauthorized access, and publishing obscene material.
- Other relevant laws include the IPC for offenses like fraud, forgery and criminal breach of trust.
- Investigating cybercrimes involves computer forensics to preserve digital evidence that can be accepted in
The document discusses cyber terrorism, including defining it, describing its features and forms, discussing tools and methods used, and providing examples. Specifically, it defines cyber terrorism as the use of computers and telecommunications to disrupt services and cause fear by confusing populations to influence government agenda. Targets may include infrastructure like power plants. Challenges include difficulty identifying attackers due to lack of boundaries and rapidly evolving techniques.
This document discusses social engineering techniques used by attackers to trick people into divulging sensitive information or performing actions. It defines key terms and explains why social engineering is a threat even for organizations with strong technical security controls. Common social engineering attack methods are described in detail, including phishing emails, phone calls, dropping infected USB drives, and impersonation. The document emphasizes that education is needed to help people recognize and avoid social engineering tactics.
This document provides an introduction to cybercrime, including definitions of key terms, classifications of cybercrimes, and descriptions of common cybercrime activities. It defines cybercrime as illegal activities that target computer systems and data. Cybercrimes are categorized as those against individuals, property, organizations, and society. Examples include phishing, spamming, hacking, software piracy, and cyberterrorism. Cybercriminals are also classified as those seeking recognition, financial gain, or insider revenge.
The document discusses cyber security fundamentals and challenges, describing how Cloudflare provides security solutions like DDoS mitigation, bot management, and web application firewalls to protect websites and applications from threats. It explains common security threats like DDoS attacks, bots, and vulnerabilities and how Cloudflare uses a global network and machine learning to detect and block attacks while ensuring high performance and availability.
The document discusses machine learning and its applications in cyber security. It provides an introduction to machine learning and how it is used to analyze large amounts of data and make decisions without being explicitly programmed. Examples of machine learning applications discussed include recommendation systems, activity recognition, weather forecasting, and image processing. The document also discusses how machine learning is being applied in cyber security to help detect sophisticated cyber attacks.
IP spoofing involves an attacker using a spoofed IP address to gain access to information or systems. There are several types of attacks that use IP spoofing, including blind spoofing where the attacker does not see return packets, man-in-the-middle attacks by intercepting traffic, and source routing attacks where the attacker specifies their system is in the packet route. Defenses include not relying on IP-based authentication, using router filters to block spoofed packets, and using random sequence numbers to prevent prediction. While less common now, application spoofing remains a threat if programs are not properly configured.
This document discusses different types of cyber attacks including passive attacks like eavesdropping and masquerading, active attacks like denial of service, and methods attackers use like spoofing, backdoors, brute force attacks, and dictionary attacks. It provides details on how each attack compromises security through unauthorized access, modification of data, denial of service, or repudiation.
Cybercrime involves using computers or the internet to steal identities or import illegal programs. The first recorded cybercrime took place in 1820. There are different types of cybercrimes such as hacking, denial of service attacks, computer viruses, and software piracy. Cybercrimes also include using computers to attack other systems, commit real-world crimes, or steal proprietary information. Common cyber attacks include financial fraud, sabotage of networks, theft of data, and unauthorized access. Internet security aims to establish rules to protect against such attacks by using antivirus software, firewalls, and updating security settings regularly.
This document discusses network security and protocols. It covers internal and external threats to networks like unauthorized access, data destruction, and hacking. It also discusses ways to protect networks from these threats, including passwords, firewalls, encryption, authentication protocols, and virtual local area networks (VLANs). The document outlines concepts like cryptography, digital signatures, and authentication protocols. It also discusses firewalls, storage technologies like RAID, NAS, and SAN for fault tolerance, and tape backups.
Cybercrime has existed since 1820, beginning with the earliest forms of computers like the abacus. Common cybercrimes include hacking, child pornography, DOS attacks, virus dissemination, computer vandalism, cyberterrorism, software piracy, phishing, and credit card fraud. Cyber security aims to prevent, detect, and respond to online attacks by protecting sensitive personal and business information, defending against critical attacks, and allowing safe internet browsing and data processing through regular software updates. Improved hacker abilities, interconnected computers, advanced malware, and increased cyber warfare threaten online security going forward.
This document discusses the growing threat of cyber attacks, especially from terrorist groups. It notes that critical infrastructure systems are increasingly vulnerable due to their interconnectivity and reliance on the internet. Terrorist groups are actively researching these systems and developing cyber capabilities. The document analyzes past cyber incidents and outlines various cyber attack methodologies that could be used, such as denial of service attacks, malware, and system compromises. It examines how terrorist groups use the internet for recruitment, fundraising, and communication. The document calls for increased prevention efforts through improved law enforcement cooperation, monitoring of online activity, and protecting critical infrastructure systems from cyber threats.
Mobile security involves protecting mobile devices and data from threats like malware, theft, and unauthorized access. Application security aims to prevent apps from stealing or hijacking data or code through measures like preventing vulnerabilities. End users are the first line of defense against threats like phishing scams. Common mobile security threats include data leakage from apps sending personal data to servers, network spoofing through fake Wi-Fi connections, social engineering tricks, malicious apps, and improper handling of sessions between mobile apps and backend servers.
Cyber crime threatens financial institutions in several ways. Hackers can access personal or sensitive information by breaking into computers. Cyber stalking and identity theft are also problems. Malicious software can steal data or damage systems. Mobile and online banking are growing targets as they handle more transactions electronically. To address cyber crime, financial institutions must implement security features, share threat information, and work with law enforcement internationally since cyber crimes often cross borders. Comprehensive strategies include prevention, investigation, prosecution, and cooperation between public and private sectors.
This document provides an overview of cybercrime in Pakistan. It begins with definitions of cybercrime and discusses major online activities and categories of cybercrime such as hacking, identity theft, and financial fraud. It then examines specific cybercrimes in more depth like hacking, website defacement, cyberbullying, child pornography, and social engineering. The document concludes by noting the role of Pakistan in cybercrime.
Cyber terrorism uses digital technology and computer networks to threaten or attack victims. There are three types of cyber terrorism attacks ranging from simple hacking to complex coordinated attacks. Examples include ATM failures, power outages, and airline crashes. While cyber terrorism allows anonymity and worldwide reach, protecting against it requires unique passwords, monitoring systems for defects, and avoiding suspicious websites or emails. As technology increasingly underpins society, cyber attacks pose a serious national security risk.
This document discusses web security and outlines some key terminology and issues. It defines internet security as protecting information by preventing, detecting, and responding to attacks. Some key points made are that 1 in 8 computers are infected with malware, spam and phishing attacks are common threats, and firewalls and antivirus software can help secure systems and block unwanted traffic. The document also provides definitions for common security terms like hackers, viruses, Trojan horses, and ransomware.
Facebook allowed a third party, Cambridge Analytica, to access personal data of up to 87 million users under the guise of academic research. However, Facebook's security protocols were triggered by the large amount of data being collected. While companies collect personal data and share it with third parties, they may not adequately monitor how the data is used. Tools like encryption, VPNs, and password managers can help protect privacy by limiting who can access information. However, with increasing automated attacks, compliance regulations, unsecured IoT devices, and cloud security incidents, online privacy and security remain an ongoing challenge.
This document discusses cyber crime and provides an overview of the topic. It defines cyber crime as illegal activities committed using computers and networks. The document then covers the history of cyber crime, types of cyber criminals, common types of cyber crimes like hacking and viruses, the rising issue of cyber crime in Pakistan, and concludes with recommendations for protecting computers like using antivirus software and strong passwords.
The document discusses cyber terrorism, defining it as the politically motivated use of computers and technology to cause disruption or fear. It outlines key features like difficulty identifying attackers and lack of boundaries. Common attack methods are described as IP spoofing, password cracking, and denial-of-service attacks. Examples of cyber terrorism include hacking, introducing viruses, website defacing, and terroristic threats by email. The document concludes by emphasizing the need for vigilance, updated security software, and protecting personal information to prevent cyber terrorism.
The document provides tips for keeping a network secure, including always keeping virus software and Windows updates enabled, using firewalls, backing up data regularly, and using strong passwords. It warns about common password risks like using obvious words or writing passwords down. The document also covers securing laptops, email, wireless networks, and avoiding risks from open networks. Proper authentication, surge protection, and password protecting are emphasized as important security best practices.
Computer crime and internet crime privacyGouthamXander
This document discusses computer crime and internet crime. It defines computer crime as any crime committed with the help of a computer. The history of computer crime is explored, from early physical damage to systems in the 1960s-1980s to modern financial crimes and malware attacks enabled by greater internet access and connectivity. Various categories of computer crime are also outlined, including computer viruses, denial of service attacks, malware, hacking, pirating, illegal trading, cyber terrorism, and pornography. Ways to protect against computer crime through anti-virus software, firewalls, and online safety are suggested.
Ip spoofing & types of attachs using itRajesh Porwal
1. IP spoofing is a technique where an attacker sends messages to a computer using a forged IP address, making it appear the message is from a trusted host. There are four main types of spoofing attacks: non-blind, blind, man-in-the-middle, and denial of service.
2. In a man-in-the-middle attack, the attacker intercepts legitimate communication between two hosts to control the flow of information and alter messages without the participants' knowledge.
3. IP spoofing is commonly used in denial of service attacks to flood the target with packets from spoofed IP addresses, making the source of the attack difficult to trace and stop.
Cyber Crime, Cyber Space and Effects .pptxSahilMishra81
This document summarizes a presentation titled "CyberCrime,CyberSpaceandEffectsofCyberCrime..." The presentation contains sections on introduction, literature survey, problem statement, objectives and scope, system architecture, advantages and disadvantages, application, conclusion, and references.
The introduction defines cyber space as global domain of interconnected information systems and defines cybercrime as using computers for illegal acts like fraud and intellectual property theft. The literature survey section reviews previous work on the topic. The problem statement discusses issues with e-governance, social media, and online risks. The objectives aim to reduce cybercrime cases reported in media. The system architecture proposes best practices to avoid financial fraud and improve mobile and social media security.
Cyber Crime Cyber Space and Effects .pptxSahilMishra81
This document summarizes a presentation titled "CyberCrime,CyberSpaceandEffectsofCyberCrime..." The presentation includes sections on introduction, literature survey, problem statement, objectives and scope, system architecture, advantages and disadvantages, application, conclusion, and references.
The introduction defines cyber space, cyber crime, and discusses some common effects of cyber crimes like identity theft, ransomware, and data breaches. The literature survey section reviews the evolution of cyber space and internet connectivity. The problem statement discusses issues with e-governance, social media, and online risks. The objectives aim to reduce cyber cases reported in media. The advantages section outlines best security practices for passwords, Facebook, Gmail, and
The document discusses cyber security fundamentals and challenges, describing how Cloudflare provides security solutions like DDoS mitigation, bot management, and web application firewalls to protect websites and applications from threats. It explains common security threats like DDoS attacks, bots, and vulnerabilities and how Cloudflare uses a global network and machine learning to detect and block attacks while ensuring high performance and availability.
The document discusses machine learning and its applications in cyber security. It provides an introduction to machine learning and how it is used to analyze large amounts of data and make decisions without being explicitly programmed. Examples of machine learning applications discussed include recommendation systems, activity recognition, weather forecasting, and image processing. The document also discusses how machine learning is being applied in cyber security to help detect sophisticated cyber attacks.
IP spoofing involves an attacker using a spoofed IP address to gain access to information or systems. There are several types of attacks that use IP spoofing, including blind spoofing where the attacker does not see return packets, man-in-the-middle attacks by intercepting traffic, and source routing attacks where the attacker specifies their system is in the packet route. Defenses include not relying on IP-based authentication, using router filters to block spoofed packets, and using random sequence numbers to prevent prediction. While less common now, application spoofing remains a threat if programs are not properly configured.
This document discusses different types of cyber attacks including passive attacks like eavesdropping and masquerading, active attacks like denial of service, and methods attackers use like spoofing, backdoors, brute force attacks, and dictionary attacks. It provides details on how each attack compromises security through unauthorized access, modification of data, denial of service, or repudiation.
Cybercrime involves using computers or the internet to steal identities or import illegal programs. The first recorded cybercrime took place in 1820. There are different types of cybercrimes such as hacking, denial of service attacks, computer viruses, and software piracy. Cybercrimes also include using computers to attack other systems, commit real-world crimes, or steal proprietary information. Common cyber attacks include financial fraud, sabotage of networks, theft of data, and unauthorized access. Internet security aims to establish rules to protect against such attacks by using antivirus software, firewalls, and updating security settings regularly.
This document discusses network security and protocols. It covers internal and external threats to networks like unauthorized access, data destruction, and hacking. It also discusses ways to protect networks from these threats, including passwords, firewalls, encryption, authentication protocols, and virtual local area networks (VLANs). The document outlines concepts like cryptography, digital signatures, and authentication protocols. It also discusses firewalls, storage technologies like RAID, NAS, and SAN for fault tolerance, and tape backups.
Cybercrime has existed since 1820, beginning with the earliest forms of computers like the abacus. Common cybercrimes include hacking, child pornography, DOS attacks, virus dissemination, computer vandalism, cyberterrorism, software piracy, phishing, and credit card fraud. Cyber security aims to prevent, detect, and respond to online attacks by protecting sensitive personal and business information, defending against critical attacks, and allowing safe internet browsing and data processing through regular software updates. Improved hacker abilities, interconnected computers, advanced malware, and increased cyber warfare threaten online security going forward.
This document discusses the growing threat of cyber attacks, especially from terrorist groups. It notes that critical infrastructure systems are increasingly vulnerable due to their interconnectivity and reliance on the internet. Terrorist groups are actively researching these systems and developing cyber capabilities. The document analyzes past cyber incidents and outlines various cyber attack methodologies that could be used, such as denial of service attacks, malware, and system compromises. It examines how terrorist groups use the internet for recruitment, fundraising, and communication. The document calls for increased prevention efforts through improved law enforcement cooperation, monitoring of online activity, and protecting critical infrastructure systems from cyber threats.
Mobile security involves protecting mobile devices and data from threats like malware, theft, and unauthorized access. Application security aims to prevent apps from stealing or hijacking data or code through measures like preventing vulnerabilities. End users are the first line of defense against threats like phishing scams. Common mobile security threats include data leakage from apps sending personal data to servers, network spoofing through fake Wi-Fi connections, social engineering tricks, malicious apps, and improper handling of sessions between mobile apps and backend servers.
Cyber crime threatens financial institutions in several ways. Hackers can access personal or sensitive information by breaking into computers. Cyber stalking and identity theft are also problems. Malicious software can steal data or damage systems. Mobile and online banking are growing targets as they handle more transactions electronically. To address cyber crime, financial institutions must implement security features, share threat information, and work with law enforcement internationally since cyber crimes often cross borders. Comprehensive strategies include prevention, investigation, prosecution, and cooperation between public and private sectors.
This document provides an overview of cybercrime in Pakistan. It begins with definitions of cybercrime and discusses major online activities and categories of cybercrime such as hacking, identity theft, and financial fraud. It then examines specific cybercrimes in more depth like hacking, website defacement, cyberbullying, child pornography, and social engineering. The document concludes by noting the role of Pakistan in cybercrime.
Cyber terrorism uses digital technology and computer networks to threaten or attack victims. There are three types of cyber terrorism attacks ranging from simple hacking to complex coordinated attacks. Examples include ATM failures, power outages, and airline crashes. While cyber terrorism allows anonymity and worldwide reach, protecting against it requires unique passwords, monitoring systems for defects, and avoiding suspicious websites or emails. As technology increasingly underpins society, cyber attacks pose a serious national security risk.
This document discusses web security and outlines some key terminology and issues. It defines internet security as protecting information by preventing, detecting, and responding to attacks. Some key points made are that 1 in 8 computers are infected with malware, spam and phishing attacks are common threats, and firewalls and antivirus software can help secure systems and block unwanted traffic. The document also provides definitions for common security terms like hackers, viruses, Trojan horses, and ransomware.
Facebook allowed a third party, Cambridge Analytica, to access personal data of up to 87 million users under the guise of academic research. However, Facebook's security protocols were triggered by the large amount of data being collected. While companies collect personal data and share it with third parties, they may not adequately monitor how the data is used. Tools like encryption, VPNs, and password managers can help protect privacy by limiting who can access information. However, with increasing automated attacks, compliance regulations, unsecured IoT devices, and cloud security incidents, online privacy and security remain an ongoing challenge.
This document discusses cyber crime and provides an overview of the topic. It defines cyber crime as illegal activities committed using computers and networks. The document then covers the history of cyber crime, types of cyber criminals, common types of cyber crimes like hacking and viruses, the rising issue of cyber crime in Pakistan, and concludes with recommendations for protecting computers like using antivirus software and strong passwords.
The document discusses cyber terrorism, defining it as the politically motivated use of computers and technology to cause disruption or fear. It outlines key features like difficulty identifying attackers and lack of boundaries. Common attack methods are described as IP spoofing, password cracking, and denial-of-service attacks. Examples of cyber terrorism include hacking, introducing viruses, website defacing, and terroristic threats by email. The document concludes by emphasizing the need for vigilance, updated security software, and protecting personal information to prevent cyber terrorism.
The document provides tips for keeping a network secure, including always keeping virus software and Windows updates enabled, using firewalls, backing up data regularly, and using strong passwords. It warns about common password risks like using obvious words or writing passwords down. The document also covers securing laptops, email, wireless networks, and avoiding risks from open networks. Proper authentication, surge protection, and password protecting are emphasized as important security best practices.
Computer crime and internet crime privacyGouthamXander
This document discusses computer crime and internet crime. It defines computer crime as any crime committed with the help of a computer. The history of computer crime is explored, from early physical damage to systems in the 1960s-1980s to modern financial crimes and malware attacks enabled by greater internet access and connectivity. Various categories of computer crime are also outlined, including computer viruses, denial of service attacks, malware, hacking, pirating, illegal trading, cyber terrorism, and pornography. Ways to protect against computer crime through anti-virus software, firewalls, and online safety are suggested.
Ip spoofing & types of attachs using itRajesh Porwal
1. IP spoofing is a technique where an attacker sends messages to a computer using a forged IP address, making it appear the message is from a trusted host. There are four main types of spoofing attacks: non-blind, blind, man-in-the-middle, and denial of service.
2. In a man-in-the-middle attack, the attacker intercepts legitimate communication between two hosts to control the flow of information and alter messages without the participants' knowledge.
3. IP spoofing is commonly used in denial of service attacks to flood the target with packets from spoofed IP addresses, making the source of the attack difficult to trace and stop.
Cyber Crime, Cyber Space and Effects .pptxSahilMishra81
This document summarizes a presentation titled "CyberCrime,CyberSpaceandEffectsofCyberCrime..." The presentation contains sections on introduction, literature survey, problem statement, objectives and scope, system architecture, advantages and disadvantages, application, conclusion, and references.
The introduction defines cyber space as global domain of interconnected information systems and defines cybercrime as using computers for illegal acts like fraud and intellectual property theft. The literature survey section reviews previous work on the topic. The problem statement discusses issues with e-governance, social media, and online risks. The objectives aim to reduce cybercrime cases reported in media. The system architecture proposes best practices to avoid financial fraud and improve mobile and social media security.
Cyber Crime Cyber Space and Effects .pptxSahilMishra81
This document summarizes a presentation titled "CyberCrime,CyberSpaceandEffectsofCyberCrime..." The presentation includes sections on introduction, literature survey, problem statement, objectives and scope, system architecture, advantages and disadvantages, application, conclusion, and references.
The introduction defines cyber space, cyber crime, and discusses some common effects of cyber crimes like identity theft, ransomware, and data breaches. The literature survey section reviews the evolution of cyber space and internet connectivity. The problem statement discusses issues with e-governance, social media, and online risks. The objectives aim to reduce cyber cases reported in media. The advantages section outlines best security practices for passwords, Facebook, Gmail, and
Kandarp Shah has over 10 years of experience in information security consulting. The presentation aims to educate students about technology, internet, and cyber crimes as well as preventative measures. Cyber crime refers to criminal acts using computers and the internet. Motivations for cyber crimes include money, curiosity, revenge, and praise. Cyber crimes are increasing due to greater internet and smartphone use. Common cyber crimes discussed include cyber pornography, identity theft, email spoofing, intellectual property crimes, and cyber defamation.
This document discusses cybercrime and cyber laws in India. It defines cybercrime as crimes committed using computers and the internet, such as identity theft, hacking, and spreading viruses. The first recorded cybercrime took place in 1820 when employees sabotaged a new textile loom technology out of fear for their jobs. Common cybercrimes discussed include hacking, phishing, software piracy, and cyberbullying. The document also outlines key sections of India's Information Technology Act that pertains to cybercrime and establishes punishments such as fines and imprisonment. In recent years, India has experienced increasing cybercrime and is now ranked 4th globally for incidents.
This document provides an overview of cyber crime and security. It begins with an introduction that defines cyber crime and notes it is a prevalent crime in modern India. It then covers the history of cyber crime beginning with hackers illegally accessing computer networks. The document outlines several categories of cyber crime like identity theft, hacking, and cyber espionage. It discusses prevention methods and concludes with the 90 sections of the Indian IT Act that address various cyber crimes and penalties.
This PPt is very useful for any students , Law enforcement agencies, Cyber Forensic Experts. It includes Overview of Cyber Law in India which includes cyber offences and penalties. This ppt will help for the public to aware about cyber crime. This ppt covers Information Technology Act, 2000 and highlights on IT (Amendment) Act, 2008. This PPt also covers applicability of IT Act and Other Act's sections to Cyber crimes.
The document discusses various types of cyber crimes such as hacking, data theft, email spoofing, identity theft, child pornography, denial of service attacks, virus dissemination, computer vandalism, cyberterrorism, and software piracy. It provides details on the first recorded cyber crime in 1820, and categorizes cyber crimes as those using computers as targets or weapons. For each crime, it outlines the relevant Indian laws and punishments prescribed under the Information Technology Act and Indian Penal Code.
The document discusses various types of cybercrimes and email related crimes under Indian law. It provides examples and explanations of different cybercrimes like hacking, data theft, virus spreading, and intellectual property violations. It also examines specific email crimes such as lottery scams, sending malicious codes, email bombing, illegal email forwarding, threatening emails, and identity theft through email spoofing. The legal provisions in the Information Technology Act, 2000 and the Indian Penal Code dealing with these cybercrimes are outlined along with relevant case studies.
The document discusses various types of cybercrimes and email related crimes under Indian law. It provides examples and explanations of different cybercrimes like hacking, data theft, virus spreading, and intellectual property violations. It specifically examines email related crimes such as phishing, email spoofing and identity theft, email bombing, sending threatening emails, and spreading communal disharmony through emails. Relevant sections of the Indian Penal Code and Information Technology Act are referenced to explain the legal status of these crimes.
The document discusses various types of cybercrimes and email related crimes under Indian law. It provides examples and explanations of different cybercrimes like hacking, data theft, virus spreading, and intellectual property violations. It also examines specific email crimes such as phishing, spoofing, lottery scams, and sending threatening/explicit emails. For each crime, it summarizes the applicable Indian laws and sections along with examples of legal cases.
Cyber crimes can take many forms and involve using computers or the internet illegally. The document outlines several common types of cyber crimes including cyber stalking, pornography, hacking and cracking, and cyber terrorism. Cyber stalking involves harassing others online through means like sending threatening emails. Pornography crimes relate to distributing obscene or child pornography online. Hacking aims to gain unauthorized access to computer systems or networks, while cracking modifies data. Cyber terrorism uses the internet for political purposes to threaten unity or security. The document provides details on the nature and punishments for these cyber crimes under Indian law.
Cyber laws and cyber crimes are discussed. Cyber law refers to legal issues related to communications technology and the internet. The Information Technology Act was passed in 2000 in India to recognize electronic transactions and facilitate electronic filing. Cyber crimes include hacking, data theft, spreading viruses, identity theft, and email spoofing. The IT Act and Indian Penal Code sections apply to cyber crimes and outline punishments such as imprisonment and fines. Cyber laws are needed to tackle cyber crimes and protect intellectual property rights in today's internet-reliant world.
Cyber laws and cyber crimes are discussed. Cyber law refers to legal issues related to communications technology and the internet. The Information Technology Act was passed in 2000 in India to recognize electronic transactions and facilitate electronic filing. Cyber crimes include hacking, data theft, spreading viruses, identity theft, and email spoofing. The IT Act and Indian Penal Code sections apply to cyber crimes and outline punishments such as imprisonment and fines. Cyber laws are needed to tackle cyber crimes and protect intellectual property rights in today's internet-reliant world.
The Maharashtra government's official website was hacked on September 20, 2007. The website remained closed for the day. Cyber crimes have been occurring since the 1820s in France. Computers can be used as tools to commit crimes like forgery, threats, identity theft, or can be targets themselves through viruses, hacking, and software piracy. Legislation is needed to address crimes involving computers and the internet. Various types of cyber crimes include hacking, information theft, email bombing, denial of service attacks, and Trojan attacks. The document then provides examples and details on some of these crimes and discusses cyber security and privacy recommendations.
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
The document defines and discusses various types of cyber crimes. It begins by defining cybercrime as any unlawful act involving computers and networks. There are two main types - crimes that target computers directly through malware or denial of service attacks, and crimes that use computers to enable other illegal acts. Cybercrimes are further classified based on their targets, including individual, property, organizational, and societal crimes.
The document then lists and describes 16 specific types of cybercrimes such as child pornography, cyberbullying, cyberstalking, phishing, ransomware, and software piracy. It concludes by providing 7 tips for preventing cybercrimes, such as using security programs, safe online practices,
This document discusses cyber crimes and cyber law in India. It begins by defining cyber law and the Information Technology Act 2000. It then discusses the need for cyber law to prevent cyber crimes, recognize digital signatures, promote e-commerce, protect intellectual property, and protect data and privacy. Several common cyber crimes are described such as phishing, vishing, smishing, ATM skimming, hacking, privacy violations, cyber stalking, cyber defamation, child pornography, and identity theft. The document concludes with recommendations on investigating cyber crimes and tips for staying safe online and preventing cyber crimes.
This document discusses cyber crime and provides an overview presented by Dr. Soreingam Ragui. It defines cyber crime as any illegal activity committed using computers or networks. India ranks 11th globally for cyber crime, constituting 3% of total cyber crime. Reasons for India's high rates include a rapidly growing internet user base. Common cyber crimes include hacking, phishing, and intellectual property theft. The document also discusses Indian cyber law and acts like the Information Technology Act of 2000.
This document discusses high tech crimes and cybersecurity. It provides examples of different types of high tech crimes like data theft, hacking, identity theft, and cyberterrorism. It also discusses measures that can be taken to enhance cybersecurity, like using antivirus software, firewalls, strong passwords, and backing up data. Forensics procedures for investigating cybercrimes are also summarized.
This document provides an overview of cyber crime and forensics. It discusses the types of cyber crimes like hacking, phishing, software piracy and cyber stalking. It also outlines the steps of computer forensics which include acquisition, identification, evaluation and presentation of digital evidence. Common tools used in computer forensics are also mentioned.
1. Cyberbullying and online threats are common, with 2 in 5 kids being bullied online and 9 in 10 having their feelings hurt online. The consequences of online threats can sometimes be tragic.
2. Parents should monitor who their children are interacting with online and what types of content they are accessing and discussing to prevent risks.
3. Cyber ethics aim to establish moral principles for appropriate computer and internet use, covering issues like privacy, access rights, and avoiding harmful actions. Following cyber ethics can help people use the internet responsibly.
Similar to Cyber Space Threats and Opportunities (20)
Financial Crime and Investigation- Finacial FraudsJayakumar PP
Financial Fraud and crime investigation to law enforcement agencies. This document will give complete picture on online payment methods in India, various payment schemes. precautionary measures while doing digital and online payments. Different types of financial frauds reported. How to mitigate financial frauds. Tips for investigating officers. Including Credit card and debit card and its scams. Cover various sections related with IPC and Information Technology section for taking action against fraudsters. Modus of operand for Financial Fraud. Internet and cyber space evolution. Internet connectivity evolution. IoT and its ecosystem.
Blockchain technology and logistics managementJayakumar PP
Basic understanding of Blockchain Technology. Give special focus to the application of blockchain in Logistics Management and Supply chain. It covers the following topics
Introduction to the blockchain, The current situation in the logistics industry, The Blockchain technology - the paradigm shifter in logistics, Block Chian Technology - Explain technology aspects and features, Basics on Blockchain security, Blockchain capabilities and its advantages to the logistics industry, Value-added to the industry, Implementation challenges, Finally with the conclusion and one best practice with ship chain company.
The document summarizes the Akshaya project in Kerala, India, which aimed to bridge the digital divide and bring IT access to rural communities. It discusses how the project was launched in 2002 in Malappuram district inspired by PURA, with the goal of making at least one person per family electronically literate. By 2004, Akshaya achieved this goal and expanded statewide. It established local e-centers run by entrepreneurs to provide services like bill payment, tax filing, and e-learning opportunities. Over time, Akshaya grew to become one of the world's largest telecenter networks and helped advance e-governance initiatives across Kerala.
Project planning is essential for software projects. It involves estimating the work, resources, and time required. Key planning activities include defining problems and requirements, developing solution strategies, and planning development processes. Requirements planning is especially important - it helps eliminate defects by gaining user involvement, understanding critical needs, and considering non-functional requirements. Empirical studies show most firms plan feasibility and costs, though risk management practices vary. Thorough early planning is needed to estimate schedules, efforts, people and resources needed for a project's success.
The document discusses various types of cyber crimes against individuals, organizations, and society. It explains that cyber crimes are increasing due to factors like global connectivity, easy access to hacking tools, numerous vulnerable targets, and anonymity online. Common cyber crimes include hacking, cyber stalking, pornography, email spoofing, cyber defamation, and financial crimes like online cheating. The document also outlines relevant sections of laws in India that pertain to cyber crimes.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
4. • The Internet of Things (IoT) is the network of physical
objects—devices, vehicles, buildings and other items
embedded with electronics, software, sensors, and
network connectivity—that enables these objects to
collect and exchange data.
What is IoT?
IOT?
In simple words, Internet of Things (IoT) is
an ecosystem of connected physical objects
that are accessible through the internet.
5. • 1969 – Jan 2 – ARPANET – Four centers
• India joined in the year 1995 –Aug 15
• Instant Communications, News Reference, Resea
Entertainment, Shopping, etc, etc..
• 1972 Ray Tomlinson invents eMail.
• 1983 Invents Internet Protocol
• 1989 first World Wide Web Developed
• 1994 First G-Web Browser Developed (Mosaic).
• 1995 Internet open for commercial purpose.
The Internet is a Great Place
13. • eGovernance
• Social Media site
• Micro Blogs
• Mobile Apps
• Web Sites
• Internet has: porn sites
– hate sites pirated software, music, movies
– viruses and malicious downloads, spyware
– scams and data collection sites
• Harassment and legal/financial risks
Things Around Us!!!
19. • www.classmates.com – 1995 Randy Conrads
• Facebook & Orkut in the year 2004
• Twitter in the year 2006
• Google plus in the year 2011
20. 1. Information Technology Act
2000
2. Indian Penal Code – 1860
3. Indian Copyright Act – 1957
• IT Act Applicable to all states of
India including Jammu & Kashmir
• It is applicable to any violation of the
provisions of this Act done by any
person anywhere in the world.
28. Mobile phone harrassment is also called
BULLYING, which is a general term to describe any
type of unwanted telephone calls or messages, or
picture messages, intended to cause upset and
grief !!! – Sec 499, 509 of IPC and 120(o) KP Act .
✓Word, gesture or act intended to insult the modesty of a
woman.
✓Shall be punished with simple imprisonment for a term
which may extend to one year, or with fine, or with both
31. Similarly, Section 419 of the IPC could also be
applied with the same qualification that it must
be making a pecuniary(financial) benefit to it.
Under Section 465 of the Act, a person committing
forgery shall be imprisoned for up to two years
and shall also liable to pay fine
➢ Section 499/500 IPC: When fake profile is posted with defamatory
content with an intention to defame other, the offence punishable
under Section 499/500 IPC (defamation) is attracted.
Details Required
➢ URL of the Suspect FB Account
➢ Screen Shot of FB Account – Two or more
➢ ID Proof & Photo of the Complainant
➢ URL & Screen Shot of the any post related with the
Social Media – Fake Profile
32. Making a fake account of another person
Section 66-D of Information Technology Act 2000, which was
subsequently amended in 2008, states that “whoever by
means of any communication device or computer
resource cheats by personating, shall be punished with
imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which
may extend to one lakh rupees.”[1]
. The real face behind the fake profile can be traced through
IP address. Internet Protocol address (IP address) is a
numeric label – a set of four numbers (Eg. 202.54.30.1) –
that is assigned to every device (e.g., computer, printer)
participating on the internet
Social Media – Fake Account
33. Online Game
❖Addiction
❖Loss of interest
❖Underdeveloped physical condition
❖Decline in personal hygiene
❖Declining social activity
34. Roblox - popular with kids, teens and even adults, which allows users
to interact with one another in this virtual world, play games and also
engage in role play.
My Friend Cayla - smart toy looks like an innocent baby doll with
pretty features, lovely hair, a sweet smile, and an equally adorable outfit.
Blue Whale -This social media game dares its players to also
participate in a series of tasks which are detrimental to their health and can
also cause them great harm.
Fire Fairy - This online prank targets younger children and is
modelled after the animated series, It gives dangerous instructions to
unsuspecting kids on how they can become a magical “fire fairy”.
Cloud Pets -These innocent-looking smart toys which come as a
cuddly elephant, bear, cat, rabbit, dog or unicorn can record audio
messages via a mobile app and replay them for your child’s entertainment.
The Pass Out Challenge. The Salt and Ice Challenge
The Fire Challenge The Cutting Challenge
Dangerous Online Games
36. Details Required
❖ Card No (Credit/Debit)
❖ Bank & Account No
❖ Suspect Mobile Number (Call Received)
❖ Transaction details (Date, Time)
❖ Transaction ID(SMS), Amount, Wallet, Bank, etc.
Collect above details at the earliest and forward to
Cyber Cell
❖ Whatsapp 9497976000,9497981288,9847435193
❖ We can Collect, KYC, Mobile SDR & CDR, CAF
Online Financial Fradus
37.
38.
39.
40.
41. Unauthorized access of
❑Computer & Its resources
❑Telecommunication devices
❑Telecommunication media, etc.
Section 65 Tampering with computer Source
document.
Section 66 – Hacking with computer systems –
including all activities mentioned in the sec 43
Imprisonment up to three years, or with
fine which may extend up to two lakh
rupees, or with both
41
42. 42
Hacking : - Hacker can be used to denote a
computer expert engaged in solving complex
problems on computers or persons securing
unauthorized access, looks around , collects
information and leaves without a trace. Hacking
done with malicious intention is called cracker.
Phreaker:- is a person who manipulates and
disrupts telecomm systems. Today
telecommunication systems has also been
computerized.
43. 43
❖ The worst passwords to use are the ones
that come to mind first -- name, spouse's name,
maiden name, pets, children's name, even
street addresses, etc.
❖ The best passwords mix numbers with upper
and lowercase letters.
❖ A password that is not found in the dictionary
is even better. There are programs that will try
every word in the dictionary in an effort to crack
your security. Changing passwords regularly
❖
45. Trusted Friends
Trusted friends are friends you can reach out to if you
ever get locked out of your Facebook account .
Secure Browsing (https)
Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
Login Notifications
Login Notifications are an opt-in security feature where
alerts are sent to you each time your account is
accessed from a new device. Add a Mobile Number.
Login Approvals : Similar to Login Notifications , but
need security code to login.
Password, Message & Links, Personal Information, Browser
Security & Computer Security
46. 1. Getting started with 2-step verification
2. Check the forwarding and delegation in mail
settings tab.
3. Update your secondary email address and your
security question, and provide a mobile phone for SMS-
based account recovery
4. Secure Browsing (https)
Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
5. Check recent IP addresses accessing the account
6. Backup your Gmail Account- (Thunderbird, Outlook , Pocomail).
Password, Message & Links, Personal Information, Browser
Security & Computer Security
49. A person following another especially women and
continuously harassing through online
Cyber Stalking is generally considered as use of the
Internet, e-mail or other electronic communications
device to stalk or harass a person.
Sec. 499, 503,509 IPC & Section 120(o) of KP Act.
Punishable with simple imprisonment for a term which may extend to two
years, or with fine, or with both.
Sec 503 IPC Sending threatening messages by e-
mail
Sec 499 IPC Sending defamatory messages by e-
mail
50. • Sexual Harassment
• Obsession for love
• Revenge & Hate
• Ego & Power Trips
➢Their main targets are the mostly females,
children, emotionally weak or unstable, etc. It is
believed that Over 75% of the victims are female
51. • Publishing sexual activities in the form of
visuals, audio or through text to raise
erotic feelings rather than aesthetic.
✓ New concept called as SEXTING
✓ Sending sexually explicit pictures by cell phone or
Email
51
52. 52
Section 67 – Publishing of information which
is obscene in electronic form. 3 years or with fine
not exceeding 5 lakh
Sec 67 A - Punishment for publishing or transmitting of
material containing sexually explicit act, etc., in electronic
form. five years and with fine which may extend to ten lakh
rupees
Sec 119 of KP Act - Punishment for atrocities against
women. – (1) Any person who,—
(a) performs, in public places, any sexual gestures or acts
degrading the dignity of women; or
24(b) takes photographs or records videos or propagates them at
any place in a manner affecting the reasonable privacy of women.
Cases : Ramankari Teacher, Chengannur Beauty & Banlglore student,etc.
3 yrs imprisonment & Fine
53. • Put utmost care in selecting friends – All kinds of
Criminals are in this Social media.
• Don’t post family information publicly
• Don’t post, share and like defamatory comments
and contents.
• Don’t post dirty videos
• Don’t post live pictures while u r travelling.
• Note : Once u posted something, it will not taken
back from the Cyber World.
• Founders: Larry Page, Sergey Brin – 1998, 2004 -
Mark Zuckerberg, Dustin Moskovitz, W3C-Tim
Berners-Lee
54. • Fake Profiles – 499,500,509 IPC– 3 yrs + 2
lakhs.
• Defamatory posting – 3 yrs + Fine.
• Posting private parts of a person – Sec 66E -3
yrs. + 2 lakhs.
• Sexual messages & Audios – Sec 67 -3 yrs + 5
lakhs.
• Posting Sexual videos – Sec 67 A – 5 yrs + 10
lakh ( 7 yrs + 10 lakhs).
• Posting and downloading sexual videos of
children's – Sec 67 B - 5 yrs + 10 lakh ( 7 yrs +
10 lakhs).
55.
56.
57. Publishing statements lowering the
reputation of persons.
When someone publishes defamatory
matter about someone on a website or
sends e-mails, pictures, etc. containing
defamatory information to all of that
person's friends or on the internet.
Sec 499,500,503.
In case of sexual abuse against
women. Sec 509 & 354(a) IPC
63. ➢Criminal creates a “mirror” website that
looks like a legitimate website
➢They fool people into going to that site,
which transmits your username or
password to the them
➢Using pop-up windows to conceal the
real address in the victim’s address bar
➢“Pharming” victim redirected to a scam
website when the victim types in the
real address
71. Section 468. Forgery for purpose of cheating
Whoever commits forgery, intending that the
document or Electronic Record forged shall be used
for the purpose of cheating, shall be punished with
imprisonment of either description for a term which
may extend to seven years, and shall also be liable to
fine.
Section 420. Cheating and dishonestly inducing
delivery of property
shall be punished with imprisonment of either
description for a term which may extend to seven
years, and shall also be liable to fine.
72. ➢ Cyber Piracy is defined as art of making illegal
copies of Music, Books, software etc for the
purpose of sale.
➢ The major form of piracy on the net is violation
of copyrights and trade marks. A part of this piracy
had also been cyber squatting of domain names.
➢ Shall be punishable under section. 51, 63, 63B
of Indian Copyright Act.
73. • Where we stand
– Twentieth in top 20 pirating countries
– At 73%, behind China (92%), Vietnam (92%),
Indonesia (88%) and Russia (87%)
– Losses at $367 million
• Benefits of piracy control
– Reduction of piracy by 10% will
• Promote innovation
• Add $1.2 billion to GDP
• Create 48,000 jobs
• Add $92 million to tax revenues
75. Threat vs. Opportunity
• If misunderstood and misconfigured,
misused Technology poses risk to our data,
privacy, and safety
• If understood , secured, efficient use of
Technology will enhance communications,
lifestyle, and delivery of services
76. The Biggest Investment is
“Investment in as much of yourself as you can, you are
your own biggest by far.
✓ Are you wiser to day than yesterday, or last day , or last
year , or five years ago
✓ Are you taking good care to be physically and mentally
fit.
78. 78
“Awareness about Cyber-crime threats is the best
tool to avoid of being a victim”.
Jayakumar PP
9847435193
jkambala@gmail.com
https://www.facebook.com/jayakumar.purushan
https://www.linkedin.com/pub/jayakumar-pp/65/59b/773
http://www.slideshare.net/jayakumarpurushan