SlideShare a Scribd company logo
1 of 5
Download to read offline
Cybersecurity(20MCA251) by PRONAB KURMI(1BO20MC016)
Q. Explain about impact of cybercrimes in social Engineering? Human based social
engineering.
Ans->
Cyber Crime
Criminal act ivies carried out by means of computer/internet(network) i.e. it may
be a tool or target
A crime conducted in which a computer was directly and significantly instrumental
is known as “Computer Crime.
A crime committed using a computer and the Internet to steal person’s identity
or sell illegal or smuggled goods or disturb any operations with malicious program
is known as “Cyber Crime”.
The first Cyber Crime
The first recorded cybercrime took place in 1820. In 1820, Joseph-Marie Jacquard,
a textile manufacturer in France, produced the loom. This device allowed the
repetition of a series of steps in the weaving of special fabrics. This resulted in a
fear amongst Jacquard's employees that their traditional employment and
livelihood were being threatened. They committed acts of sabotage to discourage
Jacquard from further use of the new technology. This is the first recorded
cybercrime!
SOCIAL ENGINEERING
Social engineering is the “technique to influence” people to obtain the
information.
 It is generally observed that people are the weak link in security and this
principle makes social engineering possible.
 Social engineering involves gaining sensitive information or unauthorized
access privileges by building inappropriate trust relationships with insiders.
Classification of Social Engineering
➢ Human Based Social Engineering
➢ Computer Based Social Engineering
Cybersecurity(20MCA251) by PRONAB KURMI(1BO20MC016)
Human Based Social Engineering: Human based social engineering refers to
person-to-person interaction to get information.
Cybercrime against an individual
 Electronic mail spoofing and other online frauds
 Phishing, spear phishing
 spamming
 Cyber defamation
 Cyberstalking and harassment
 Computer sabotage
 Pornographic offenses
 password sniffing
E-Mail Spoofing
 E-mail spoofing is the forgery of an e-mail header so that the message
appears to have originated from someone or somewhere other than the
actual source.
 To send spoofed e-mail, senders insert commands in headers that will alter
message information.
 It is possible to send a message that appears to be from anyone, anywhere,
saying whatever the sender wants it to say.
 Thus, someone could send spoofed e-mail that appears to be from you with
a message that you didn't write.
 Although most spoofed e-mail falls into the "nuisance" category and
requires little action other than deletion, the more malicious varieties can
cause serious problems and security risks.
 For example, spoofed e-mail may purport to be from someone in a position
of authority, asking for sensitive data, such as passwords, credit card
numbers, or other personal information -- any of which can be used for a
variety of criminal purposes.
Cybersecurity(20MCA251) by PRONAB KURMI(1BO20MC016)
Spamming
 People who create electronic spam : spammers
 Spam is abuse of electronic messaging systems to send unsolicited bulk
messages indiscriminately
 Spamming is difficult to control
 Advertisers have no operating costs beyond the management of their
mailing lists
 It is difficult to hold senders accountable for their mass mailings
 Spammers are numerous
 Spamming may be
 E-Mail Spam
 Instant messaging spam
 Usenet group spam
 Web search engine spam
 Spam in blogs, wiki spam
 Online classified ads spam
Identity theft
 Identity theft is a fraud involving another person’s identity for an illicit
purpose.
 The criminal uses someone else’s identity for his/ her own illegal purposes.
 Phishing and identity theft are related offenses
 Examples:
 Fraudulently obtaining credit
 Stealing money from victim’s bank account
 Using victim’s credit card number
 Establishing accounts with utility companies
 Renting an apartment
 Filing bankruptcy using the victim’s name
Cybersecurity(20MCA251) by PRONAB KURMI(1BO20MC016)
Cyber defamation
 Cyber defamation is considered to be the act of defaming, insulting,
offending or otherwise causing harm through false statements pertaining
to an individual in cyberspace.
 Example: someone publishes defamatory matter about someone on a
website or sends an E-mail containing defamatory information to all friends
of that person
 It may amount to defamation when-
 If imputation to a deceased person would harm the reputation of
that person, and is intended to be hurtful to the feelings of his family
or other near relatives
 An imputation is made concerning a company or an association or
collection of people as such.
 An imputation in the form of an alternative or expressed ironically
 An imputation that directly or indirectly, in the estimation of others,
lowers the moral or intellectual character of that person, or lowers
the character of that person in respect of his caste or of his calling, or
lowers the credit of that person.
Types of defamation
 written defamation
 oral defamation
 The complaint must have to show that the defamatory statements
were unlawful and would indeed injure the person’s or organization’s
reputation.
Cybersecurity(20MCA251) by PRONAB KURMI(1BO20MC016)
Computer Based Social Engineering: Computer based social engineering refers to
an attempt made to
get the required information by using computer software/internet.
✓ Fake E-mail
✓ E-mail attachments
✓ Pop-up windows

More Related Content

What's hot (20)

CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Impact of cybercrime

Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crimeasha mali
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
Internet
InternetInternet
InternetJodip
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
cybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.pptcybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.pptSIRINET2
 
Name parul
Name parulName parul
Name parulParul231
 
Name parul
Name parulName parul
Name parulParul231
 
Internet related frauds
Internet related fraudsInternet related frauds
Internet related fraudsTejalAdani
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 

Similar to Impact of cybercrime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Unit 1
Unit 1Unit 1
Unit 1
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Internet
InternetInternet
Internet
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
cybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.pptcybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.ppt
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Internet related frauds
Internet related fraudsInternet related frauds
Internet related frauds
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Impact of cybercrime

  • 1. Cybersecurity(20MCA251) by PRONAB KURMI(1BO20MC016) Q. Explain about impact of cybercrimes in social Engineering? Human based social engineering. Ans-> Cyber Crime Criminal act ivies carried out by means of computer/internet(network) i.e. it may be a tool or target A crime conducted in which a computer was directly and significantly instrumental is known as “Computer Crime. A crime committed using a computer and the Internet to steal person’s identity or sell illegal or smuggled goods or disturb any operations with malicious program is known as “Cyber Crime”. The first Cyber Crime The first recorded cybercrime took place in 1820. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cybercrime! SOCIAL ENGINEERING Social engineering is the “technique to influence” people to obtain the information.  It is generally observed that people are the weak link in security and this principle makes social engineering possible.  Social engineering involves gaining sensitive information or unauthorized access privileges by building inappropriate trust relationships with insiders. Classification of Social Engineering ➢ Human Based Social Engineering ➢ Computer Based Social Engineering
  • 2. Cybersecurity(20MCA251) by PRONAB KURMI(1BO20MC016) Human Based Social Engineering: Human based social engineering refers to person-to-person interaction to get information. Cybercrime against an individual  Electronic mail spoofing and other online frauds  Phishing, spear phishing  spamming  Cyber defamation  Cyberstalking and harassment  Computer sabotage  Pornographic offenses  password sniffing E-Mail Spoofing  E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.  To send spoofed e-mail, senders insert commands in headers that will alter message information.  It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say.  Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.  Although most spoofed e-mail falls into the "nuisance" category and requires little action other than deletion, the more malicious varieties can cause serious problems and security risks.  For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information -- any of which can be used for a variety of criminal purposes.
  • 3. Cybersecurity(20MCA251) by PRONAB KURMI(1BO20MC016) Spamming  People who create electronic spam : spammers  Spam is abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately  Spamming is difficult to control  Advertisers have no operating costs beyond the management of their mailing lists  It is difficult to hold senders accountable for their mass mailings  Spammers are numerous  Spamming may be  E-Mail Spam  Instant messaging spam  Usenet group spam  Web search engine spam  Spam in blogs, wiki spam  Online classified ads spam Identity theft  Identity theft is a fraud involving another person’s identity for an illicit purpose.  The criminal uses someone else’s identity for his/ her own illegal purposes.  Phishing and identity theft are related offenses  Examples:  Fraudulently obtaining credit  Stealing money from victim’s bank account  Using victim’s credit card number  Establishing accounts with utility companies  Renting an apartment  Filing bankruptcy using the victim’s name
  • 4. Cybersecurity(20MCA251) by PRONAB KURMI(1BO20MC016) Cyber defamation  Cyber defamation is considered to be the act of defaming, insulting, offending or otherwise causing harm through false statements pertaining to an individual in cyberspace.  Example: someone publishes defamatory matter about someone on a website or sends an E-mail containing defamatory information to all friends of that person  It may amount to defamation when-  If imputation to a deceased person would harm the reputation of that person, and is intended to be hurtful to the feelings of his family or other near relatives  An imputation is made concerning a company or an association or collection of people as such.  An imputation in the form of an alternative or expressed ironically  An imputation that directly or indirectly, in the estimation of others, lowers the moral or intellectual character of that person, or lowers the character of that person in respect of his caste or of his calling, or lowers the credit of that person. Types of defamation  written defamation  oral defamation  The complaint must have to show that the defamatory statements were unlawful and would indeed injure the person’s or organization’s reputation.
  • 5. Cybersecurity(20MCA251) by PRONAB KURMI(1BO20MC016) Computer Based Social Engineering: Computer based social engineering refers to an attempt made to get the required information by using computer software/internet. ✓ Fake E-mail ✓ E-mail attachments ✓ Pop-up windows