SlideShare a Scribd company logo
Causes of Cybercrime and
Preventive Measures
Group Number: - 7
Group Members: -
• Komal Dhiranan
• Ritama Jana
• Shivanshu Yadav
• Kabir Wasan
• Edison
1
Content Points
.
Introduction to the topic
Protection and Prevention
Global Case & Future of
Cybersecurity
Cases of Cybercrime in India
Types of Cyber Crimes
2
3
What is Cybercrime ?
An illegal activity
Includes non-monetary offences
Increase the volume and pace of crimes
4
Have you ever seen such messages/e-mails
5
Causes of Cybercrime
Computer devices
can store large data
that makes easier
for the hackers to
steal information
The human mind is
imperfect, so they can do
mistakes at any stage.
Cybercriminals take
advantage of these gaps.
01
02
Hackers can easily
bypass firewalls
that can give them
access to your
device
03
Our negligence
which provides
cyber-criminal
access and control
over the computer
system
04
The data related to
the crime can be
easily destroyed.
05
6
Types Of Cybercrimes
Phishing
Identity
Theft
01
02
Cyberstalking
03 Ransomware
04
Hacking
05
7
Types Of Cybercrimes
Logic Bombs
DDOS
Attack
06
07
Botnets
08 Malvertising
09
Cyber
Terrorism
10
8
Cybercrime Cases in India
2015 2017 2019 2020
Zomato
Amitabh Bachchan’s
Twitter A/C Hack
Indian Army
Big Basket
9
10
Preventive Measures
against Cybercrime
11
Companies at Higher Risk of Cybercrime
India has been the second most cyber attacks affected country
between 2019 to 2020, according to a new Data Security Council of
India (DSCI) report
According to a CISCO Annual Cyber Security Report, 53% of all cyber
attacks led to financial damages of more than $500K (including lost
revenue, customers, opportunities, and out-of-pocket costs among
others) for organisations in 2019.
0% 10% 20% 30% 40% 50% 60% 70% 80%
Healthcare
IT & Telecoms
Legal
HR & Recruitment
Manufacturing & Utilities
Finance
Companies Prone to Cyber attacks in
India
3-4 breaches 2 breaches
12
Encrypt and
backup data
Educate staff on
cyber security
Create a security-
focused workplace
culture
Conduct regular
audits
Don’t rely on
cyber security
insurance
Fight Technology with Technology
13
Promoting internet safety amongst
‘Netizens'
VS
How vulnerable are children to
cybercrime?
Cyber Illiteracy
• Monitor kids online activity
• Prevent cyberbullying
• Protect your kid’s identity
• Increase awareness
• Use strong, unique passwords
• Protect your computer
You should know what to do if you become a victim!!!
• Think twice about using public Wi-Fi
• When in doubt, don’t click
• Go offline when you don’t need an
internet connection.
• Make sure your security software is
current and update it regularly.
• Encrypt and back up your most
important data
14
Cybercrime in India: Laws, Regulations,
and Enforcement Mechanisms
The Indian cyber laws are governed by the Information
Technology Act
INFORMATION TECHNOLOGY ACT, 2000" [ITA- 2000] was enacted
by Parliament of India to protect the field of e-commerce, e-
governance, e-banking as well as penalties and punishments in
the field of cyber crimes. The above Act was further amended in
the form of IT Amendment Act, 2008 [ITAA-2008].
Cyber law encompasses laws relating to:
· Cyber crimes
· Electronic and digital signatures
· Intellectual property
· Data protection and privacy
Report crime related to women/child:
Type of cybercrimes you can report
Report other cybercrimes: mobile crimes, online and social
media crimes, online financial frauds, ransomware, hacking,
cryptocurrency crimes and online cyber trafficking.
How to report a cyber crime
There are two ways to register complaint under “report crime
related to women/child”
• Report Anonymously
• Report and Track
You can also send a mail to complaint-mwcd@gov.in
Check Status of complaint
15
Cyber Attacks 2020
• Due to covid-19 pandemic, majority of activities turned into On-line.
• In 2020, 445 million cybercrime cases which is double when compared to
2019.
• In July 15, 2020 TWITTER became victim of cyber attack.
• 130 accounts were breached including Joe Bidden, Barack Obama,
Warren Buffett, Bill Gates etc.…
16
• Google announced that its technology
infrastructure had been the targeted by China-led
cyber attacks.
• The operation was called “OPERATION AURORA”
• The attack was an attempt to access Gmail accounts
of Chinese human rights activists.
China’s Attack on Google ’09
17
Google’s Reaction
• Google responded that there is no attack
on the cloud of people
• Impact:
 Less use of the product of google
Harder to attract new clients
Lost some current clients.
• This was the end of Google’s journey in
China.
18
Companies at Higher Risk of CybercrimeA Glimpse into the Future of Cybersecurity
• Ongoing development :-
online society
cybercriminal activity
law enforcement.
• Greater career opportunity
• cybrary.it provides free online
cybersecurity training.
• 3.5 million unfilled cybersecurity jobs
by 2021.
19
Conclusion
• Crimes do not occur behind the computer, but
executed by computer.
• The weapons are not guns anymore but mouse
cursors and passwords.
• Organizations can reduce exposure to
cybercrimes by maintaining an effective
cybersecurity strategy.
20
Bibliography
21
https://www.imperva.com/learn/application-security/cyber-security/
https://www.pandasecurity.com/en/mediacenter/panda-security/types-of-cybercrime/
https://timesofindia.indiatimes.com/india/hacker-steals-17-million-zomato-users-
data-briefly-puts-it-on-dark-web/articleshow/58742129.cms
https://timesofindia.indiatimes.com/india/Army-officers-panic-as-hackers-steal-
secret-data/articleshow/46856789.cms
https://www.ndtv.com/india-news/amitabh-bachchan-twitter-amitabh-bachchan-
twitter-account-hacked-profile-photo-shows-imran-khan-2051138
https://indianexpress.com/article/explained/explained-how-big-is-the-bigbasket-
data-breach-7026688/
22
THANK YOU

More Related Content

What's hot

Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
KnowBe4
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
GAURAV. H .TANDON
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptx
nikshaikh786
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Ransomware
RansomwareRansomware
Ransomware
DeepakKumar4980
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
AniketPandit18
 
Phishing
PhishingPhishing
Phishing
anjalika sinha
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
Zyxware Technologies
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
BGA Cyber Security
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
little robie
 

What's hot (20)

Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptx
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Ransomware
RansomwareRansomware
Ransomware
 
Ingeniería Social 2014
Ingeniería Social 2014Ingeniería Social 2014
Ingeniería Social 2014
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Phishing
PhishingPhishing
Phishing
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 

Similar to Cybercrime & Cybersecurity

CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
Shashwata Sahu
 
Presentation(Cyber crime & security)
Presentation(Cyber crime & security)Presentation(Cyber crime & security)
Presentation(Cyber crime & security)
Ikhtiar Khan Sohan
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
GDSCCVR
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
chauhan323234
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
SumandeepKaur733500
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
IRJET Journal
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
xosap
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
ACAD1ITG
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
SABBY GILL
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
Dababrata Mondal
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
Kalilur Rahman
 
cyber crime
cyber crimecyber crime
cyber crimeMukund10
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
Eddie Hirst MSc MSyl
 

Similar to Cybercrime & Cybersecurity (20)

CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
Presentation(Cyber crime & security)
Presentation(Cyber crime & security)Presentation(Cyber crime & security)
Presentation(Cyber crime & security)
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
cyber crime
cyber crimecyber crime
cyber crime
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 

Recently uploaded

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 

Recently uploaded (16)

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 

Cybercrime & Cybersecurity

  • 1. Causes of Cybercrime and Preventive Measures Group Number: - 7 Group Members: - • Komal Dhiranan • Ritama Jana • Shivanshu Yadav • Kabir Wasan • Edison 1
  • 2. Content Points . Introduction to the topic Protection and Prevention Global Case & Future of Cybersecurity Cases of Cybercrime in India Types of Cyber Crimes 2
  • 3. 3 What is Cybercrime ? An illegal activity Includes non-monetary offences Increase the volume and pace of crimes
  • 4. 4
  • 5. Have you ever seen such messages/e-mails 5
  • 6. Causes of Cybercrime Computer devices can store large data that makes easier for the hackers to steal information The human mind is imperfect, so they can do mistakes at any stage. Cybercriminals take advantage of these gaps. 01 02 Hackers can easily bypass firewalls that can give them access to your device 03 Our negligence which provides cyber-criminal access and control over the computer system 04 The data related to the crime can be easily destroyed. 05 6
  • 8. Types Of Cybercrimes Logic Bombs DDOS Attack 06 07 Botnets 08 Malvertising 09 Cyber Terrorism 10 8
  • 9. Cybercrime Cases in India 2015 2017 2019 2020 Zomato Amitabh Bachchan’s Twitter A/C Hack Indian Army Big Basket 9
  • 10. 10
  • 12. Companies at Higher Risk of Cybercrime India has been the second most cyber attacks affected country between 2019 to 2020, according to a new Data Security Council of India (DSCI) report According to a CISCO Annual Cyber Security Report, 53% of all cyber attacks led to financial damages of more than $500K (including lost revenue, customers, opportunities, and out-of-pocket costs among others) for organisations in 2019. 0% 10% 20% 30% 40% 50% 60% 70% 80% Healthcare IT & Telecoms Legal HR & Recruitment Manufacturing & Utilities Finance Companies Prone to Cyber attacks in India 3-4 breaches 2 breaches 12
  • 13. Encrypt and backup data Educate staff on cyber security Create a security- focused workplace culture Conduct regular audits Don’t rely on cyber security insurance Fight Technology with Technology 13
  • 14. Promoting internet safety amongst ‘Netizens' VS How vulnerable are children to cybercrime? Cyber Illiteracy • Monitor kids online activity • Prevent cyberbullying • Protect your kid’s identity • Increase awareness • Use strong, unique passwords • Protect your computer You should know what to do if you become a victim!!! • Think twice about using public Wi-Fi • When in doubt, don’t click • Go offline when you don’t need an internet connection. • Make sure your security software is current and update it regularly. • Encrypt and back up your most important data 14
  • 15. Cybercrime in India: Laws, Regulations, and Enforcement Mechanisms The Indian cyber laws are governed by the Information Technology Act INFORMATION TECHNOLOGY ACT, 2000" [ITA- 2000] was enacted by Parliament of India to protect the field of e-commerce, e- governance, e-banking as well as penalties and punishments in the field of cyber crimes. The above Act was further amended in the form of IT Amendment Act, 2008 [ITAA-2008]. Cyber law encompasses laws relating to: · Cyber crimes · Electronic and digital signatures · Intellectual property · Data protection and privacy Report crime related to women/child: Type of cybercrimes you can report Report other cybercrimes: mobile crimes, online and social media crimes, online financial frauds, ransomware, hacking, cryptocurrency crimes and online cyber trafficking. How to report a cyber crime There are two ways to register complaint under “report crime related to women/child” • Report Anonymously • Report and Track You can also send a mail to complaint-mwcd@gov.in Check Status of complaint 15
  • 16. Cyber Attacks 2020 • Due to covid-19 pandemic, majority of activities turned into On-line. • In 2020, 445 million cybercrime cases which is double when compared to 2019. • In July 15, 2020 TWITTER became victim of cyber attack. • 130 accounts were breached including Joe Bidden, Barack Obama, Warren Buffett, Bill Gates etc.… 16
  • 17. • Google announced that its technology infrastructure had been the targeted by China-led cyber attacks. • The operation was called “OPERATION AURORA” • The attack was an attempt to access Gmail accounts of Chinese human rights activists. China’s Attack on Google ’09 17
  • 18. Google’s Reaction • Google responded that there is no attack on the cloud of people • Impact:  Less use of the product of google Harder to attract new clients Lost some current clients. • This was the end of Google’s journey in China. 18
  • 19. Companies at Higher Risk of CybercrimeA Glimpse into the Future of Cybersecurity • Ongoing development :- online society cybercriminal activity law enforcement. • Greater career opportunity • cybrary.it provides free online cybersecurity training. • 3.5 million unfilled cybersecurity jobs by 2021. 19
  • 20. Conclusion • Crimes do not occur behind the computer, but executed by computer. • The weapons are not guns anymore but mouse cursors and passwords. • Organizations can reduce exposure to cybercrimes by maintaining an effective cybersecurity strategy. 20