SlideShare a Scribd company logo
CYBERCRIME VICTIMS
Shashwata Sahu,
PhD Scholar,
KIIT School of Law
What is cybercrime?
Cybercrime is a criminal offense that involves the use of computers or the internet.
It can include a wide range of activities, such as:
● Identity theft
● Data breaches
● Online fraud
● Cyberbullying
● Child exploitation
In 2021, the FBI received over 800,000 complaints of cybercrime, with total losses
estimated at over $6.9 billion.
Cyber Crime
Victims
Cybercrime victims are individuals or
organizations that have been harmed
by a cybercrime. This can include
financial losses, identity theft,
reputational damage, and
psychological trauma. Cybercrime
victims can be of any age, gender, or
occupation.
Common characteristics of cybercrime
victims include:
● Lack of awareness about cyber
threats
● Insufficient cybersecurity
practices
● Trust in deceptive online
interactions
Case Studies
● Case 1: The Equifax Data Breach:
In 2017, a massive data breach at Equifax exposed the personal information of over
147 million Americans, highlighting the devastating consequences of cyberattacks.
● Case 2: The Infosys NSE Data Breach (2016)
In 2016, Infosys, a leading Indian IT company, suffered a significant data breach,
exposing the personal and financial information of millions of National Stock
Exchange (NSE) employees. The breach was attributed to a group of hackers who
gained access to Infosys' network through a compromised employee account.
● Case 3: The Big Bazaar Customer Data Breach (2019)
In 2019, Big Bazaar, a large Indian retail chain, experienced a data breach that
exposed the personal information of around 100 million customers. The breach was
attributed to a vulnerability in Big Bazaar's e-commerce platform.
Financial costs of cybercrime
● Cybercrime can have a significant financial impact on victims.
● In 2021, the average loss per victim of identity theft was $3,354.
● The average loss per victim of data breach was $3,929.
● The average loss per victim of online fraud was $2,432.
Financial Losses and Identity Theft:
Cybercrime can result in significant financial losses, credit card debt, and
difficulty accessing essential services due to compromised identities.
● Economic Losses: Cyberattacks can lead to data breaches, disrupting
business operations, hindering productivity, and causing substantial
financial losses.
● Reputational Damage and Loss of Trust: Cybercrime can tarnish a
Emotional costs of
cybercrime
Cybercrime can also have a significant emotional impact
on victims.
Victims may experience:
Anxiety
Depression
Fear
Shame
Anger
Challenges Faced by Victims
Reporting Difficulties: Victims may face reluctance to report
due to fear of embarrassment, lack of understanding of
reporting procedures, and concerns about law enforcement
involvement.
Legal Complexities: Navigating the legal system to pursue
justice can be daunting and time-consuming, often with limited
success.
Emotional Trauma: The emotional impact of cybercrime can
hinder victims' ability to cope, seek help, and regain a sense of
normalcy.
Support Systems
There are a number of
resources available to help
victims of cybercrime.
These resources can provide:
● Emotional support
● Financial assistance
● Legal advice
● Information on how to
protect yourself from
cybercrime
Law Enforcement Response
Victim Support
Organizations
Online Resources for Victims
Government Initiatives. Legal Provisions
Establishment of
Cybercrime Task
Forces
Development of
Cybersecurity Policies
and Regulations
Cybercrime Awareness
Campaigns
The Information Technology Act,
2000 (IT Act):
Section - 43A, 65B, 66A, 66C, 66D
Section 72, 72A
The Indian Penal Code (IPC):
Section 419, 420, 463
The Cybercrime (Amendment) Act,
2013
The Digital Personal Data Protection
(DPDP) Act, 2023
Prevention and Awareness
Empowering Individuals and
Organizations
Importance of Cybersecurity
Education: Widespread
education about cyber threats,
safe online practices, and
password management is
essential for prevention.
Tips for Staying Safe Online:
● Use strong, unique passwords
for all accounts.
● Avoid clicking on suspicious
links or attachments.
● Be cautious about sharing
personal information online.
● Regularly update software and
operating systems.
● Employ antivirus and anti-
malware protection.
Conclusion
Cybercrime is a serious problem that can have a devastating impact on victims.
Cybercrime poses a significant threat to individuals, businesses, and national
security.However, there are resources available to help victims recover from
this experience.
By adopting a proactive approach and prioritizing cybersecurity, we can create
a safer and more secure digital environment for all.
THANK YOU!
Shashwata Sahu

More Related Content

What's hot

Investigating Trade-Based Money Laundering
Investigating Trade-Based Money LaunderingInvestigating Trade-Based Money Laundering
Investigating Trade-Based Money Laundering
Case IQ
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
Cut 2 Shreds
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
Jeetendra Khilnani
 
Identity theft
Identity theftIdentity theft
Identity theft
Eqhball Ghazizadeh
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
sonalikharade3
 
Information security
Information securityInformation security
Cyber Crime
Cyber CrimeCyber Crime
Binary code
Binary codeBinary code
Binary code
Juzen1600101
 
Digital signature
Digital signatureDigital signature
Digital signature
Hossain Md Shakhawat
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
ISO/IEC 27001:2013
ISO/IEC 27001:2013ISO/IEC 27001:2013
ISO/IEC 27001:2013
Ramiro Cid
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
Dr. Prashant Vats
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
robinlgray
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
nikshaikh786
 
How an online payment gateway works
How an online payment gateway worksHow an online payment gateway works
How an online payment gateway works
Ikajo International
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Raheela Patel
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
Dixita S
 

What's hot (20)

Investigating Trade-Based Money Laundering
Investigating Trade-Based Money LaunderingInvestigating Trade-Based Money Laundering
Investigating Trade-Based Money Laundering
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Information security
Information securityInformation security
Information security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Binary code
Binary codeBinary code
Binary code
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
ISO/IEC 27001:2013
ISO/IEC 27001:2013ISO/IEC 27001:2013
ISO/IEC 27001:2013
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
How an online payment gateway works
How an online payment gateway worksHow an online payment gateway works
How an online payment gateway works
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 

Similar to CYBERCRIME VICTIMS

Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
RitamaJana
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
ACAD1ITG
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
Mehedi Hasan
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
Ankush saini
 
Cyber security
Cyber securityCyber security
Cyber security
Satbharai Sethar
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
Welch LLP
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
Kalilur Rahman
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
IJSRED
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
stephaniewaters1212
 
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
MAHIRA
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
praveen1792
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
BakerTillyConsulting
 
The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
IRJET Journal
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR
 
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
ijsc
 
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
ijsc
 

Similar to CYBERCRIME VICTIMS (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
 
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
 

More from Shashwata Sahu

Case Summary of State of U.P. v.Chandrika.pptx
Case Summary of State of U.P. v.Chandrika.pptxCase Summary of State of U.P. v.Chandrika.pptx
Case Summary of State of U.P. v.Chandrika.pptx
Shashwata Sahu
 
Case Summary of Prosecutor v. Thomas Lubanga Dyilo.pptx
Case Summary of Prosecutor v. Thomas Lubanga Dyilo.pptxCase Summary of Prosecutor v. Thomas Lubanga Dyilo.pptx
Case Summary of Prosecutor v. Thomas Lubanga Dyilo.pptx
Shashwata Sahu
 
Air Act,1981.pptx
Air Act,1981.pptxAir Act,1981.pptx
Air Act,1981.pptx
Shashwata Sahu
 
Article - 16.pptx
Article - 16.pptxArticle - 16.pptx
Article - 16.pptx
Shashwata Sahu
 
Public Trust Doctrine.pptx
Public Trust Doctrine.pptxPublic Trust Doctrine.pptx
Public Trust Doctrine.pptx
Shashwata Sahu
 
Article-15.pptx
Article-15.pptxArticle-15.pptx
Article-15.pptx
Shashwata Sahu
 
Role of Media in Democracy.pptx
Role of Media in Democracy.pptxRole of Media in Democracy.pptx
Role of Media in Democracy.pptx
Shashwata Sahu
 
Public Policy.pptx
Public Policy.pptxPublic Policy.pptx
Public Policy.pptx
Shashwata Sahu
 

More from Shashwata Sahu (8)

Case Summary of State of U.P. v.Chandrika.pptx
Case Summary of State of U.P. v.Chandrika.pptxCase Summary of State of U.P. v.Chandrika.pptx
Case Summary of State of U.P. v.Chandrika.pptx
 
Case Summary of Prosecutor v. Thomas Lubanga Dyilo.pptx
Case Summary of Prosecutor v. Thomas Lubanga Dyilo.pptxCase Summary of Prosecutor v. Thomas Lubanga Dyilo.pptx
Case Summary of Prosecutor v. Thomas Lubanga Dyilo.pptx
 
Air Act,1981.pptx
Air Act,1981.pptxAir Act,1981.pptx
Air Act,1981.pptx
 
Article - 16.pptx
Article - 16.pptxArticle - 16.pptx
Article - 16.pptx
 
Public Trust Doctrine.pptx
Public Trust Doctrine.pptxPublic Trust Doctrine.pptx
Public Trust Doctrine.pptx
 
Article-15.pptx
Article-15.pptxArticle-15.pptx
Article-15.pptx
 
Role of Media in Democracy.pptx
Role of Media in Democracy.pptxRole of Media in Democracy.pptx
Role of Media in Democracy.pptx
 
Public Policy.pptx
Public Policy.pptxPublic Policy.pptx
Public Policy.pptx
 

Recently uploaded

production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...
production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...
production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...
ElenaLazr2
 
Comparative analysis of ipc and bharitye Naya sahinta
Comparative analysis of ipc and bharitye Naya sahintaComparative analysis of ipc and bharitye Naya sahinta
Comparative analysis of ipc and bharitye Naya sahinta
adi2292
 
Legal Research and Legal Methodology-1.pptx
Legal Research and Legal Methodology-1.pptxLegal Research and Legal Methodology-1.pptx
Legal Research and Legal Methodology-1.pptx
varalakshmillm
 
United States vs. Donald Trump Speaking Indictment
United States vs. Donald Trump Speaking IndictmentUnited States vs. Donald Trump Speaking Indictment
United States vs. Donald Trump Speaking Indictment
Todd Spodek
 
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
aypxuyw
 
一比一原版伯恩茅斯大学毕业证(bu毕业证)如何办理
一比一原版伯恩茅斯大学毕业证(bu毕业证)如何办理一比一原版伯恩茅斯大学毕业证(bu毕业证)如何办理
一比一原版伯恩茅斯大学毕业证(bu毕业证)如何办理
ymefneb
 
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
ubype
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
RoseZubler1
 
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
onduyv
 
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
uhsox
 
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
AHRP Law Firm
 
PoliticalScience_SrSec_2023-24.pdfffffff
PoliticalScience_SrSec_2023-24.pdfffffffPoliticalScience_SrSec_2023-24.pdfffffff
PoliticalScience_SrSec_2023-24.pdfffffff
RajatVerma652178
 
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
ucoux1
 
一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理
ooqzo
 
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
fexbqa
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
abondo3
 
一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理
一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理
一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理
duxss
 
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
meboh
 
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
bzofm
 
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
woywevt
 

Recently uploaded (20)

production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...
production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...
production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...
 
Comparative analysis of ipc and bharitye Naya sahinta
Comparative analysis of ipc and bharitye Naya sahintaComparative analysis of ipc and bharitye Naya sahinta
Comparative analysis of ipc and bharitye Naya sahinta
 
Legal Research and Legal Methodology-1.pptx
Legal Research and Legal Methodology-1.pptxLegal Research and Legal Methodology-1.pptx
Legal Research and Legal Methodology-1.pptx
 
United States vs. Donald Trump Speaking Indictment
United States vs. Donald Trump Speaking IndictmentUnited States vs. Donald Trump Speaking Indictment
United States vs. Donald Trump Speaking Indictment
 
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
 
一比一原版伯恩茅斯大学毕业证(bu毕业证)如何办理
一比一原版伯恩茅斯大学毕业证(bu毕业证)如何办理一比一原版伯恩茅斯大学毕业证(bu毕业证)如何办理
一比一原版伯恩茅斯大学毕业证(bu毕业证)如何办理
 
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
 
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
 
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
 
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
 
PoliticalScience_SrSec_2023-24.pdfffffff
PoliticalScience_SrSec_2023-24.pdfffffffPoliticalScience_SrSec_2023-24.pdfffffff
PoliticalScience_SrSec_2023-24.pdfffffff
 
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
 
一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
 
一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理
一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理
一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理
 
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
 
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
 
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
 

CYBERCRIME VICTIMS

  • 1. CYBERCRIME VICTIMS Shashwata Sahu, PhD Scholar, KIIT School of Law
  • 2. What is cybercrime? Cybercrime is a criminal offense that involves the use of computers or the internet. It can include a wide range of activities, such as: ● Identity theft ● Data breaches ● Online fraud ● Cyberbullying ● Child exploitation In 2021, the FBI received over 800,000 complaints of cybercrime, with total losses estimated at over $6.9 billion.
  • 3. Cyber Crime Victims Cybercrime victims are individuals or organizations that have been harmed by a cybercrime. This can include financial losses, identity theft, reputational damage, and psychological trauma. Cybercrime victims can be of any age, gender, or occupation. Common characteristics of cybercrime victims include: ● Lack of awareness about cyber threats ● Insufficient cybersecurity practices ● Trust in deceptive online interactions
  • 4. Case Studies ● Case 1: The Equifax Data Breach: In 2017, a massive data breach at Equifax exposed the personal information of over 147 million Americans, highlighting the devastating consequences of cyberattacks. ● Case 2: The Infosys NSE Data Breach (2016) In 2016, Infosys, a leading Indian IT company, suffered a significant data breach, exposing the personal and financial information of millions of National Stock Exchange (NSE) employees. The breach was attributed to a group of hackers who gained access to Infosys' network through a compromised employee account. ● Case 3: The Big Bazaar Customer Data Breach (2019) In 2019, Big Bazaar, a large Indian retail chain, experienced a data breach that exposed the personal information of around 100 million customers. The breach was attributed to a vulnerability in Big Bazaar's e-commerce platform.
  • 5. Financial costs of cybercrime ● Cybercrime can have a significant financial impact on victims. ● In 2021, the average loss per victim of identity theft was $3,354. ● The average loss per victim of data breach was $3,929. ● The average loss per victim of online fraud was $2,432. Financial Losses and Identity Theft: Cybercrime can result in significant financial losses, credit card debt, and difficulty accessing essential services due to compromised identities. ● Economic Losses: Cyberattacks can lead to data breaches, disrupting business operations, hindering productivity, and causing substantial financial losses. ● Reputational Damage and Loss of Trust: Cybercrime can tarnish a
  • 6. Emotional costs of cybercrime Cybercrime can also have a significant emotional impact on victims. Victims may experience: Anxiety Depression Fear Shame Anger
  • 7. Challenges Faced by Victims Reporting Difficulties: Victims may face reluctance to report due to fear of embarrassment, lack of understanding of reporting procedures, and concerns about law enforcement involvement. Legal Complexities: Navigating the legal system to pursue justice can be daunting and time-consuming, often with limited success. Emotional Trauma: The emotional impact of cybercrime can hinder victims' ability to cope, seek help, and regain a sense of normalcy.
  • 8. Support Systems There are a number of resources available to help victims of cybercrime. These resources can provide: ● Emotional support ● Financial assistance ● Legal advice ● Information on how to protect yourself from cybercrime Law Enforcement Response Victim Support Organizations Online Resources for Victims
  • 9. Government Initiatives. Legal Provisions Establishment of Cybercrime Task Forces Development of Cybersecurity Policies and Regulations Cybercrime Awareness Campaigns The Information Technology Act, 2000 (IT Act): Section - 43A, 65B, 66A, 66C, 66D Section 72, 72A The Indian Penal Code (IPC): Section 419, 420, 463 The Cybercrime (Amendment) Act, 2013 The Digital Personal Data Protection (DPDP) Act, 2023
  • 10. Prevention and Awareness Empowering Individuals and Organizations Importance of Cybersecurity Education: Widespread education about cyber threats, safe online practices, and password management is essential for prevention. Tips for Staying Safe Online: ● Use strong, unique passwords for all accounts. ● Avoid clicking on suspicious links or attachments. ● Be cautious about sharing personal information online. ● Regularly update software and operating systems. ● Employ antivirus and anti- malware protection.
  • 11. Conclusion Cybercrime is a serious problem that can have a devastating impact on victims. Cybercrime poses a significant threat to individuals, businesses, and national security.However, there are resources available to help victims recover from this experience. By adopting a proactive approach and prioritizing cybersecurity, we can create a safer and more secure digital environment for all.