The document discusses the benefits and risks of internet usage and e-banking. It outlines how the internet has changed communication and access to information. However, it has also led to increased cybercrime like hacking, phishing, and identity theft. E-banking provides convenience but lacks security. Users must be aware of threats and protect their personal information. Overall, the internet and e-banking are useful if used properly and with adequate security measures.
the new service given to the customers of commercial banks in order to ease their banking activity under e-banking system. it also a step towards green banking
the new service given to the customers of commercial banks in order to ease their banking activity under e-banking system. it also a step towards green banking
Digital payment systems are the backbone of digital commerce. Indian government along with the corporate community is making a significant push to build infrastructure for digital payments along with encouraging the citizens towards a cashless economy.
With cashless society being the current hot topic .. Digital Wallet surely covers one of them ...Here is a description about what is it and how it works .. may aid you during your final year seminar .. Cheers !!
Secure communication is when two entities are communicating and do not want a third party to listen in. For that, they need to communicate in a way not susceptible to eavesdropping or interception. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what was said. Other than spoken face-to-face communication with no possible eavesdropper, it is probably safe to say that no communication is guaranteed secure in this sense, although practical obstacles such as legislation, resources, technical issues (interception and encryption), and the sheer volume of communication serve to limit surveillance.
Social Media in Nepal presentation. Nepal is one of the fastest growing country in terms of Internet users. However, Social Media usage is limited to Facebook for most cases and YouTube (for viewing).
Active adoption of other forms of social media such as Twitter and LinkedIn is mostly limited to a smaller tech population.
Digital payment systems are the backbone of digital commerce. Indian government along with the corporate community is making a significant push to build infrastructure for digital payments along with encouraging the citizens towards a cashless economy.
With cashless society being the current hot topic .. Digital Wallet surely covers one of them ...Here is a description about what is it and how it works .. may aid you during your final year seminar .. Cheers !!
Secure communication is when two entities are communicating and do not want a third party to listen in. For that, they need to communicate in a way not susceptible to eavesdropping or interception. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what was said. Other than spoken face-to-face communication with no possible eavesdropper, it is probably safe to say that no communication is guaranteed secure in this sense, although practical obstacles such as legislation, resources, technical issues (interception and encryption), and the sheer volume of communication serve to limit surveillance.
Social Media in Nepal presentation. Nepal is one of the fastest growing country in terms of Internet users. However, Social Media usage is limited to Facebook for most cases and YouTube (for viewing).
Active adoption of other forms of social media such as Twitter and LinkedIn is mostly limited to a smaller tech population.
Presented by Ms.Rekha Thakur Assistant Professor, Himcapes School of Legal Studies, Badhera, Una, H.P.at IJSARD (International Journal of Socio-legal Analysis and Rural Development) International Virtual Conference 2017 On Law and Social Sciences.
Presented by ADV. MRS. MAYURA SABNE-BOTUNGALE Visiting Faculty of Law At Navalmal Firodia Law College, Pune, Dist- Pune at IJSARD (International Journal of Socio-legal Analysis and Rural Development) International Virtual Conference 2017 On Law and Social Sciences.
Presented by Rahul Kumar Jain, law student, Disha Law College, Raipur at IJSARD (International Journal of Socio-legal Analysis and Rural Development) International Virtual Conference 2017 On Law and Social Sciences.
Presented by Ashutosh D. Gaur Doctoral Scholar School of Doctoral Research and Innovation GLS University, Ahmedabad & Dr. Jasmin Padiya Associate Professor GLS University, Ahmedabad at IJSARD (International Journal of Socio-legal Analysis and Rural Development) International Virtual Conference 2017 On Law and Social Sciences.
A Case Study on the Level of Awareness About Constitutional and Legal Rights ...Dheeraj Kumar Tiwari
Presented by Dr. Bhavana Sharma, Principal(Offg.), HIMCAPES School of Law, Badhera, Haroli, Una, H.P. at IJSARD (International Journal of Socio-legal Analysis and Rural Development) International Virtual Conference 2017 On Law and Social Sciences.
Disaster Impact and Response- A Retrospect of 2014 Flood in Kashmir ValleyDheeraj Kumar Tiwari
Presented by ISHFAQ HUSSAIN MALIK, Research Scholar, Dept. of Geography, Aligarh Muslim University (A.M.U), Aligarh at IJSARD (International Journal of Socio-legal Analysis and Rural Development) International Virtual Conference 2017 On Law and Social Sciences.
The Great Himalayan Game: Geo-Strategic Rivalry between India and China in NepalDheeraj Kumar Tiwari
Presented by SHABIR REHMAN SHEIKH, Research Scholar, Department of Political science, Aligarh Muslim University at IJSARD (International Journal of Socio-legal Analysis and Rural Development) International Virtual Conference 2017 On Law and Social Sciences.
Presented by Shashya Mishra (Assistant Professor) Amity University Lucknow Campus, Amity Law School at IJSARD (International Journal of Socio-legal Analysis and Rural Development) International Virtual Conference 2017 On Law and Social Sciences.
Role of National Human Rights Commission in Rescue & Rehabilitation Of Traffi...Dheeraj Kumar Tiwari
Presented by MOHD. NOORUDDIN Master of Laws (LL.M), Aligarh Muslim University & NOUSHI KHAN, Master of Arts (M.A), History, Mahatma Gandhi Kashi Vidyapeeth, Varanasi at IJSARD (International Journal of Socio-legal Analysis and Rural Development) International Virtual Conference 2017 On Law and Social Sciences.
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
2. CONTENT
• INTERNET
• BENEFIT OF INTERNET
• INTERNET CHANGE OUR LIFE
• DEMRIT OF INTERNET
• CYBERCRIME
• TYPE OF CYBERCRIME
• E BANKING
• ADVNTAGES OF E BANKING
• DISADVANTAGE OF E BANKING
• SECURITY OF E BANKING
3. INTERNET
• A network which provide large number of information and
communication facilities and connect people together in easiest
manner.
4. BENEFIT OF INTERNET
• Unlimited Source Of Information
• Great Communication Media
• Ideal Working And Studying Environment
• Cost Effectiveness For Business
• The Best Relaxing Tools
5. INTERNET CHANGE OUR LIFE
1- PEOPLE ARE CONNCET MORE EASILY
• In Past Year People are connected with the telegram , Telephone ,etc. It
take more time to send information to one person to another.
• But now a days People are connect with Social networking sites like what's
app , Facebook ,Twitter, Instagram ,Etc.
• These social networking sites make life more easier and comfortable and
not take to much time to send information.
• Specially if we are taking about villagers ,they are find out any information
with the help of internet like employment news, Government Scheme
,Education Scheme , Awareness program ,Details of authorise hospitals
,etc.
6. 2 Reading new paper
• Only one Click provide several information around the world and
people are easily updated their knowledge and also get information
which is helpful for their present and future. With the help of internet
it save the paper , people get information with the help of internet
without facing any difficulties.
• Internet new paper provide new like Current affairs, Sports news,
Business news, Entertainment news, General awareness etc.
7. ONLINE MARKETING AND ONLINE SHOPPING
• Today it is easiest way to advertise most of the product or thing with the
help of internet ,with the help of MARKETING.
• Advertisement shown in internet with proper information about that
product Or thing which buyer get full information and decide wheather it is
useful Or Not.
• Marketing of products Or thing is the easiest way in the internet ,which
people are updated and buy those thing which they want.
• Most of the people use these sites like Flipkart , Abof , Jabong, Amazon,for
selling and buying Product and items with the help of nominal amount
which is comfortable to both the parties.
• Most of the grocery items are available in the internet which people buy
their product in easiest manner with cheaper price.
8. WATCHING MOVIE AND MUSIC
• We can stream almost anything online now. Music is available from
Shaven ,Wynk,Gannan.com. Movies are available from Netflix and
Amazon movie .
9. SHOWING OUR TALENT AND CREATIVIETY
• Internet change the presumption of people people`s mind .If we have
a talent and creativity we can upload these things with the help of
these platform like –YOUTUBE, INSTAGRAM .Which rest of people
learn and gain a knowledge with the help of internet and they never
keep up in their life.
10. DEMRITS OF INTERNET
• Most of things are available in internet in easiest manner ,which amount
of crime and security threat increase day by day
• Internet is not 100 % secure which arise Hacking and stealing information
from other people and use it in a wrongful manner.
• Hacking create many obstruction which Viruses are spreading any personal
system OR Mail which destroy our important data which cause lots of
problem.
• For Children ,Pornography and Paedophiles mislead the children and also
affect their behaviour and their studies.
• Student using large amount of internet surfing it`s effect concentration on
the studies.
11. CYBERCRIME
• A crime which are exploiting individual personal right and steal our
personal information use in a wrongful manner.
12. TYPE OF CYBER CRIMES
• Hacking
• Cyber squatting
• Phishing
• Cyber Staking
• Vishing
• Email bombing
• Spamming
• Web jacking
• Inditity theft and Credit Card Fraud
• Software piracy
13. HACKING
• Hacking is a Crime which unauthorised access to data in a system.
• Amount of hacking is increases day by day. So it is necessary to protect a
system with the help of ANTIVRIUES Software.
• Hacking is a crime under section 43 of the IT Act but at the same time,
ethical hacking or better known as white collar hacking was considered
legal.
• Ethical hacking is also being taught by various professionals at schools and
colleges. Under the amendment IT Act in 2008, the word ‘hacker was
removed from the act. The reason for the same was that ethical hacking is
taught by a lot of professionals at various schools and colleges, and
colleges cannot teach anything illegal. So the same word should not be
used. The amendment under section 66 and section 43 by removing the
word hacking from the Act.
14. SEC 43 OF IT ACT
• Section 43 of IT Act is a civil offense where a person without
permission of the owner accesses the computer and use any data or
damages the data contained therein will come under civil liability.
• Under the IT Act 2000, the compensation is provided for that person
who is affected . However in the amendment made in 2008, this
ceiling was removed.
• Section 43A of the Information Technology Act, 2000 has describe
reasonable security and procedures to be followed by those dealing
or handling sensitive personal data or information.
15. SEC 66A OF IT ACT
• Section 66B Stated about for obtaining stolen computer data or
information of another person uses in a wrongful manner without the
concent of actual owner of computer.
• The punishment of imprisonment for one year or a fine of rupees one
lakh or both. Mens rea is play important role under section 66A.
• What is the intention of that person who commited that offence
weather they guilty of their offence Or Not. Because every thing is
done without the consent of owner.
16. PROCEDURE FILE A COMPLANINT ABOUT
HACKING
• A complaint can be filed at any cyber cell ,which is present in India and Complaint also file with the help of online process which
we check our current status.
• Firstly write an application to the head of the cyber cell department.
• It consist following things
• NAME
• ADDRESS
• E-MAIL ADDRESS
• MOBILE/TELEPHONE NUMBER.
• Second, submit the following documents with the Cyber cell;
• Server id – Id files that get automatically with the server when files are opened. It saves a list of activities performed on day to day
basis.
• Hardcopy and soft copy of the affected material
• A hard copy of the original web pages
• Information about to the password which access the computer.
• Name of suspected person who may be involve in this crime.
17. CYBERSQUATTING
• It is a illegal domain name registration or use for wrongful intention.
• Cybersquatting can have a few different variations, but its primary
purpose is to steal or misspell a domain name in order to profit from
an increase in website .
• Cybersquatting also includes advertisers who use domain names that
are similar to popular, highly trafficked websites.
• Cybersquatting is one of several types of cybercrimes.
• These domain name use in wrongful manner to earn profit from
goodwill of trade mark. These domain name mislead the people
providing wrongful information.
18. PHISHING
• Phishing a information which contain such as usernames, passwords,
and credit card details of individual person without their consent use
in a wrongful manner through email and URL address.
19. VISHING
• the fraudulent person of making phone calls or leaving voice
messages purporting to be from reputable companies in order to
obtain individuals to personal information, such as bank details and
credit card numbers.
• Most of Victim give their details to Fraudulent person without
knowing exact fact which that person use the money or any other
information for their purpose with a wrongful intention.
20. CYBER STAKING
• Use of electronic communications to harass or frighten someone, for
by sending emails, phone call or Message.
• Cyberstalking exploitation of minors, be it sexual or otherwise.
21. E MAIL BOMBING AND SPAMMING
• IT is a cyber crime sending huge email which have no relevance to the
mail box which directly affected to Server and not use in a proper
manner.
• SPAMMING -Send a bulk of message to a large number of Internet
users for the purpose of annoying the users. Which contain improper
information, Advertisement, Marketing of the product and sale.
22. INDNDITITY THEFT AND CREDIT CARD FRAUD
• Today ,large amount of cyber crime are occur which are trying to
stolen personal information like Document, id number ,password etc.
• Most of innocent person are providing their information which
fraudulent person are gaining huge amount of money with the help of
credit card number without the consent of that innocent person.
• Most of the company or organization are affect to these fraudulent
person are leak their personal information which affect company
reputation. So it is our duty to safeguard our personal information
and never be reveal to any outside person.
23. Web jacking
• The Web Jacking is a phishing technique that Attackers that are using this
method are creating a fake website and when the victim opens the link a
page appears with the message that the website has moved and they need
to click another link. If the victim clicks the link that looks real he will
redirected to a fake page.
• These fake pages provided wrong information which victim move on a
wrong track.
• It is a quite interesting technique that tries to trick the user to believe that
the webpage is real because the link is valid. Users must be aware of this
type of attack especially when they are visiting a webpage that contains
similar messages about websites or objects that have moved to new
locations.
24. Software piracy
• Software piracy is the illegal activities which contain -
• Copying
• distribution, or use of software.
• It is a profitable "business" which frundently person gain profit to
sending information to one person to another person with a cheaper
price.
• It also affect our system with large amount of viruses contain in it.
25. E -BANKING
• It is that bank which people provide easiest method of money
transaction with the help of Internet .
Device of E Banking
• 1 ATM
• 2 Credit card
• 3 Debit card
• 4 Smart Card
26. ADVANTAGE OF E BANKING
• Convenience
• Portability
• Cost Savings
• Industry Benefits
• Helpful for shopping
• Helpful for mobile recharge
27. DISADVANTAGE OF E BANKING
• Lack of Security
• Illiteracy
• Improper knowledge due to awareness.
• Lack of technology
• Improper handling of computer or mobile device.
28. E BANKING SECURITY
• Different banks are providing their customer which contain following
things like
• Security Login ID and Password or PIN.
• Secure your computer and keep it up-to-date With latest antivirus.
• Access your accounts from a secure location OR Place.
• Bank provide awareness to their customer with the help of messages
,email , newspaper, etc.
• Email notifications to alert
• Sending current status of our bank account.
29. CONCLUSION
• Today Internet give new way of life which is helpful for each and
every people. We can use internet in a proper manner without
breaking any law and not violate any individual right.
• It is duty of government and people to provide general awareness
which no one people is affected to cybercrime and their information
is safeguard in a proper manner and provide proper security to the
Users.
• E banking play drastically role in a society ,if we use in a systematic
manner it give more advantage and helpful for future generation.
• Use a Source on that manner which set example in society ,it is
created for people learn something without facing any difficulties.