SlideShare a Scribd company logo
INTERNET
CYBERCRIME,EBANKING AND
SECURITY
I
Name-VIPIN CHANDRA JOSHI
PAPER NO-044IVC OCT 2017
CONTENT
• INTERNET
• BENEFIT OF INTERNET
• INTERNET CHANGE OUR LIFE
• DEMRIT OF INTERNET
• CYBERCRIME
• TYPE OF CYBERCRIME
• E BANKING
• ADVNTAGES OF E BANKING
• DISADVANTAGE OF E BANKING
• SECURITY OF E BANKING
INTERNET
• A network which provide large number of information and
communication facilities and connect people together in easiest
manner.
BENEFIT OF INTERNET
• Unlimited Source Of Information
• Great Communication Media
• Ideal Working And Studying Environment
• Cost Effectiveness For Business
• The Best Relaxing Tools
INTERNET CHANGE OUR LIFE
1- PEOPLE ARE CONNCET MORE EASILY
• In Past Year People are connected with the telegram , Telephone ,etc. It
take more time to send information to one person to another.
• But now a days People are connect with Social networking sites like what's
app , Facebook ,Twitter, Instagram ,Etc.
• These social networking sites make life more easier and comfortable and
not take to much time to send information.
• Specially if we are taking about villagers ,they are find out any information
with the help of internet like employment news, Government Scheme
,Education Scheme , Awareness program ,Details of authorise hospitals
,etc.
2 Reading new paper
• Only one Click provide several information around the world and
people are easily updated their knowledge and also get information
which is helpful for their present and future. With the help of internet
it save the paper , people get information with the help of internet
without facing any difficulties.
• Internet new paper provide new like Current affairs, Sports news,
Business news, Entertainment news, General awareness etc.
ONLINE MARKETING AND ONLINE SHOPPING
• Today it is easiest way to advertise most of the product or thing with the
help of internet ,with the help of MARKETING.
• Advertisement shown in internet with proper information about that
product Or thing which buyer get full information and decide wheather it is
useful Or Not.
• Marketing of products Or thing is the easiest way in the internet ,which
people are updated and buy those thing which they want.
• Most of the people use these sites like Flipkart , Abof , Jabong, Amazon,for
selling and buying Product and items with the help of nominal amount
which is comfortable to both the parties.
• Most of the grocery items are available in the internet which people buy
their product in easiest manner with cheaper price.
WATCHING MOVIE AND MUSIC
• We can stream almost anything online now. Music is available from
Shaven ,Wynk,Gannan.com. Movies are available from Netflix and
Amazon movie .
SHOWING OUR TALENT AND CREATIVIETY
• Internet change the presumption of people people`s mind .If we have
a talent and creativity we can upload these things with the help of
these platform like –YOUTUBE, INSTAGRAM .Which rest of people
learn and gain a knowledge with the help of internet and they never
keep up in their life.
DEMRITS OF INTERNET
• Most of things are available in internet in easiest manner ,which amount
of crime and security threat increase day by day
• Internet is not 100 % secure which arise Hacking and stealing information
from other people and use it in a wrongful manner.
• Hacking create many obstruction which Viruses are spreading any personal
system OR Mail which destroy our important data which cause lots of
problem.
• For Children ,Pornography and Paedophiles mislead the children and also
affect their behaviour and their studies.
• Student using large amount of internet surfing it`s effect concentration on
the studies.
CYBERCRIME
• A crime which are exploiting individual personal right and steal our
personal information use in a wrongful manner.
TYPE OF CYBER CRIMES
• Hacking
• Cyber squatting
• Phishing
• Cyber Staking
• Vishing
• Email bombing
• Spamming
• Web jacking
• Inditity theft and Credit Card Fraud
• Software piracy
HACKING
• Hacking is a Crime which unauthorised access to data in a system.
• Amount of hacking is increases day by day. So it is necessary to protect a
system with the help of ANTIVRIUES Software.
• Hacking is a crime under section 43 of the IT Act but at the same time,
ethical hacking or better known as white collar hacking was considered
legal.
• Ethical hacking is also being taught by various professionals at schools and
colleges. Under the amendment IT Act in 2008, the word ‘hacker was
removed from the act. The reason for the same was that ethical hacking is
taught by a lot of professionals at various schools and colleges, and
colleges cannot teach anything illegal. So the same word should not be
used. The amendment under section 66 and section 43 by removing the
word hacking from the Act.
SEC 43 OF IT ACT
• Section 43 of IT Act is a civil offense where a person without
permission of the owner accesses the computer and use any data or
damages the data contained therein will come under civil liability.
• Under the IT Act 2000, the compensation is provided for that person
who is affected . However in the amendment made in 2008, this
ceiling was removed.
• Section 43A of the Information Technology Act, 2000 has describe
reasonable security and procedures to be followed by those dealing
or handling sensitive personal data or information.
SEC 66A OF IT ACT
• Section 66B Stated about for obtaining stolen computer data or
information of another person uses in a wrongful manner without the
concent of actual owner of computer.
• The punishment of imprisonment for one year or a fine of rupees one
lakh or both. Mens rea is play important role under section 66A.
• What is the intention of that person who commited that offence
weather they guilty of their offence Or Not. Because every thing is
done without the consent of owner.
PROCEDURE FILE A COMPLANINT ABOUT
HACKING
• A complaint can be filed at any cyber cell ,which is present in India and Complaint also file with the help of online process which
we check our current status.
• Firstly write an application to the head of the cyber cell department.
• It consist following things
• NAME
• ADDRESS
• E-MAIL ADDRESS
• MOBILE/TELEPHONE NUMBER.
• Second, submit the following documents with the Cyber cell;
• Server id – Id files that get automatically with the server when files are opened. It saves a list of activities performed on day to day
basis.
• Hardcopy and soft copy of the affected material
• A hard copy of the original web pages
• Information about to the password which access the computer.
• Name of suspected person who may be involve in this crime.
CYBERSQUATTING
• It is a illegal domain name registration or use for wrongful intention.
• Cybersquatting can have a few different variations, but its primary
purpose is to steal or misspell a domain name in order to profit from
an increase in website .
• Cybersquatting also includes advertisers who use domain names that
are similar to popular, highly trafficked websites.
• Cybersquatting is one of several types of cybercrimes.
• These domain name use in wrongful manner to earn profit from
goodwill of trade mark. These domain name mislead the people
providing wrongful information.
PHISHING
• Phishing a information which contain such as usernames, passwords,
and credit card details of individual person without their consent use
in a wrongful manner through email and URL address.
VISHING
• the fraudulent person of making phone calls or leaving voice
messages purporting to be from reputable companies in order to
obtain individuals to personal information, such as bank details and
credit card numbers.
• Most of Victim give their details to Fraudulent person without
knowing exact fact which that person use the money or any other
information for their purpose with a wrongful intention.
CYBER STAKING
• Use of electronic communications to harass or frighten someone, for
by sending emails, phone call or Message.
• Cyberstalking exploitation of minors, be it sexual or otherwise.
E MAIL BOMBING AND SPAMMING
• IT is a cyber crime sending huge email which have no relevance to the
mail box which directly affected to Server and not use in a proper
manner.
• SPAMMING -Send a bulk of message to a large number of Internet
users for the purpose of annoying the users. Which contain improper
information, Advertisement, Marketing of the product and sale.
INDNDITITY THEFT AND CREDIT CARD FRAUD
• Today ,large amount of cyber crime are occur which are trying to
stolen personal information like Document, id number ,password etc.
• Most of innocent person are providing their information which
fraudulent person are gaining huge amount of money with the help of
credit card number without the consent of that innocent person.
• Most of the company or organization are affect to these fraudulent
person are leak their personal information which affect company
reputation. So it is our duty to safeguard our personal information
and never be reveal to any outside person.
Web jacking
• The Web Jacking is a phishing technique that Attackers that are using this
method are creating a fake website and when the victim opens the link a
page appears with the message that the website has moved and they need
to click another link. If the victim clicks the link that looks real he will
redirected to a fake page.
• These fake pages provided wrong information which victim move on a
wrong track.
• It is a quite interesting technique that tries to trick the user to believe that
the webpage is real because the link is valid. Users must be aware of this
type of attack especially when they are visiting a webpage that contains
similar messages about websites or objects that have moved to new
locations.
Software piracy
• Software piracy is the illegal activities which contain -
• Copying
• distribution, or use of software.
• It is a profitable "business" which frundently person gain profit to
sending information to one person to another person with a cheaper
price.
• It also affect our system with large amount of viruses contain in it.
E -BANKING
• It is that bank which people provide easiest method of money
transaction with the help of Internet .
Device of E Banking
• 1 ATM
• 2 Credit card
• 3 Debit card
• 4 Smart Card
ADVANTAGE OF E BANKING
• Convenience
• Portability
• Cost Savings
• Industry Benefits
• Helpful for shopping
• Helpful for mobile recharge
DISADVANTAGE OF E BANKING
• Lack of Security
• Illiteracy
• Improper knowledge due to awareness.
• Lack of technology
• Improper handling of computer or mobile device.
E BANKING SECURITY
• Different banks are providing their customer which contain following
things like
• Security Login ID and Password or PIN.
• Secure your computer and keep it up-to-date With latest antivirus.
• Access your accounts from a secure location OR Place.
• Bank provide awareness to their customer with the help of messages
,email , newspaper, etc.
• Email notifications to alert
• Sending current status of our bank account.
CONCLUSION
• Today Internet give new way of life which is helpful for each and
every people. We can use internet in a proper manner without
breaking any law and not violate any individual right.
• It is duty of government and people to provide general awareness
which no one people is affected to cybercrime and their information
is safeguard in a proper manner and provide proper security to the
Users.
• E banking play drastically role in a society ,if we use in a systematic
manner it give more advantage and helpful for future generation.
• Use a Source on that manner which set example in society ,it is
created for people learn something without facing any difficulties.

More Related Content

What's hot

Digital Payment Landscape in India
Digital Payment Landscape in IndiaDigital Payment Landscape in India
Digital Payment Landscape in India
Sam Ghosh
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
electronic bill payment and presentment
electronic bill payment and presentmentelectronic bill payment and presentment
electronic bill payment and presentment
tejinderubs
 
Digital wallet
Digital walletDigital wallet
Digital wallet
Lokesh Jajoo
 
Electronic Payment Systems Shortened
Electronic Payment Systems ShortenedElectronic Payment Systems Shortened
Electronic Payment Systems ShortenedRitesh Verma
 
Debit card
Debit cardDebit card
Debit card
Sanjana027
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
mahesh tawade
 
Moneypad
MoneypadMoneypad
Moneypad
ankur bhalla
 
Digital certificates
Digital certificatesDigital certificates
Digital certificatesSimmi Kamra
 
Moneypad- The future wallet
Moneypad- The future walletMoneypad- The future wallet
Moneypad- The future walletMokshada Birari
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Digital Payment Campaign
Digital Payment CampaignDigital Payment Campaign
Digital Payment Campaign
pankajkumar3274
 
Secure communication
Secure communicationSecure communication
Secure communication
Tushar Swami
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
Avinash Katariya
 
Money pad report
Money pad reportMoney pad report
Money pad report
Mokshada Birari
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Dr. Prashant Vats
 
E -payment ppt
E -payment pptE -payment ppt
E -payment ppt
rumaisa waseem
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Social Media in Nepal
Social Media in NepalSocial Media in Nepal
Social Media in Nepal
Roshan Joshi
 

What's hot (20)

Digital Payment Landscape in India
Digital Payment Landscape in IndiaDigital Payment Landscape in India
Digital Payment Landscape in India
 
Phishing
PhishingPhishing
Phishing
 
electronic bill payment and presentment
electronic bill payment and presentmentelectronic bill payment and presentment
electronic bill payment and presentment
 
Digital wallet
Digital walletDigital wallet
Digital wallet
 
Electronic Payment Systems Shortened
Electronic Payment Systems ShortenedElectronic Payment Systems Shortened
Electronic Payment Systems Shortened
 
Debit card
Debit cardDebit card
Debit card
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Moneypad
MoneypadMoneypad
Moneypad
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Moneypad- The future wallet
Moneypad- The future walletMoneypad- The future wallet
Moneypad- The future wallet
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Digital Payment Campaign
Digital Payment CampaignDigital Payment Campaign
Digital Payment Campaign
 
Secure communication
Secure communicationSecure communication
Secure communication
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Credit Cards
Credit CardsCredit Cards
Credit Cards
 
Money pad report
Money pad reportMoney pad report
Money pad report
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
E -payment ppt
E -payment pptE -payment ppt
E -payment ppt
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Social Media in Nepal
Social Media in NepalSocial Media in Nepal
Social Media in Nepal
 

Similar to Internet cybercrime,ebanking and security

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
CGC Technical campus,Mohali
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
DjTechs
 
SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
pratikshapatil62556
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
HetaDesai13
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
SahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
SahilMishra81
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
Karmaveersinghsankhl
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
EnginAltan4
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Fit Tri
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
Suman Thapaliya
 

Similar to Internet cybercrime,ebanking and security (20)

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
part 3 cyber crimes
part 3 cyber crimes part 3 cyber crimes
part 3 cyber crimes
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 

More from Dheeraj Kumar Tiwari

Situation of women in India: A critical analysis
Situation of women in India: A critical analysisSituation of women in India: A critical analysis
Situation of women in India: A critical analysis
Dheeraj Kumar Tiwari
 
TERRORISM FINANCING- INDIA FAILS TO HIT THE BULL’S EYE
TERRORISM FINANCING- INDIA FAILS TO HIT THE BULL’S EYETERRORISM FINANCING- INDIA FAILS TO HIT THE BULL’S EYE
TERRORISM FINANCING- INDIA FAILS TO HIT THE BULL’S EYE
Dheeraj Kumar Tiwari
 
E-Banking Services and Challenges in India
E-Banking Services and Challenges in IndiaE-Banking Services and Challenges in India
E-Banking Services and Challenges in India
Dheeraj Kumar Tiwari
 
Make in India and Need for Labour Reforms
Make in India and Need for Labour ReformsMake in India and Need for Labour Reforms
Make in India and Need for Labour Reforms
Dheeraj Kumar Tiwari
 
A Case Study on the Level of Awareness About Constitutional and Legal Rights ...
A Case Study on the Level of Awareness About Constitutional and Legal Rights ...A Case Study on the Level of Awareness About Constitutional and Legal Rights ...
A Case Study on the Level of Awareness About Constitutional and Legal Rights ...
Dheeraj Kumar Tiwari
 
Disaster Impact and Response- A Retrospect of 2014 Flood in Kashmir Valley
Disaster Impact and Response- A Retrospect of 2014 Flood in Kashmir ValleyDisaster Impact and Response- A Retrospect of 2014 Flood in Kashmir Valley
Disaster Impact and Response- A Retrospect of 2014 Flood in Kashmir Valley
Dheeraj Kumar Tiwari
 
The Great Himalayan Game: Geo-Strategic Rivalry between India and China in Nepal
The Great Himalayan Game: Geo-Strategic Rivalry between India and China in NepalThe Great Himalayan Game: Geo-Strategic Rivalry between India and China in Nepal
The Great Himalayan Game: Geo-Strategic Rivalry between India and China in Nepal
Dheeraj Kumar Tiwari
 
Right to Clean Environment:- A Basic Human Right
Right to Clean Environment:- A Basic Human RightRight to Clean Environment:- A Basic Human Right
Right to Clean Environment:- A Basic Human Right
Dheeraj Kumar Tiwari
 
Role of National Human Rights Commission in Rescue & Rehabilitation Of Traffi...
Role of National Human Rights Commission in Rescue & Rehabilitation Of Traffi...Role of National Human Rights Commission in Rescue & Rehabilitation Of Traffi...
Role of National Human Rights Commission in Rescue & Rehabilitation Of Traffi...
Dheeraj Kumar Tiwari
 

More from Dheeraj Kumar Tiwari (9)

Situation of women in India: A critical analysis
Situation of women in India: A critical analysisSituation of women in India: A critical analysis
Situation of women in India: A critical analysis
 
TERRORISM FINANCING- INDIA FAILS TO HIT THE BULL’S EYE
TERRORISM FINANCING- INDIA FAILS TO HIT THE BULL’S EYETERRORISM FINANCING- INDIA FAILS TO HIT THE BULL’S EYE
TERRORISM FINANCING- INDIA FAILS TO HIT THE BULL’S EYE
 
E-Banking Services and Challenges in India
E-Banking Services and Challenges in IndiaE-Banking Services and Challenges in India
E-Banking Services and Challenges in India
 
Make in India and Need for Labour Reforms
Make in India and Need for Labour ReformsMake in India and Need for Labour Reforms
Make in India and Need for Labour Reforms
 
A Case Study on the Level of Awareness About Constitutional and Legal Rights ...
A Case Study on the Level of Awareness About Constitutional and Legal Rights ...A Case Study on the Level of Awareness About Constitutional and Legal Rights ...
A Case Study on the Level of Awareness About Constitutional and Legal Rights ...
 
Disaster Impact and Response- A Retrospect of 2014 Flood in Kashmir Valley
Disaster Impact and Response- A Retrospect of 2014 Flood in Kashmir ValleyDisaster Impact and Response- A Retrospect of 2014 Flood in Kashmir Valley
Disaster Impact and Response- A Retrospect of 2014 Flood in Kashmir Valley
 
The Great Himalayan Game: Geo-Strategic Rivalry between India and China in Nepal
The Great Himalayan Game: Geo-Strategic Rivalry between India and China in NepalThe Great Himalayan Game: Geo-Strategic Rivalry between India and China in Nepal
The Great Himalayan Game: Geo-Strategic Rivalry between India and China in Nepal
 
Right to Clean Environment:- A Basic Human Right
Right to Clean Environment:- A Basic Human RightRight to Clean Environment:- A Basic Human Right
Right to Clean Environment:- A Basic Human Right
 
Role of National Human Rights Commission in Rescue & Rehabilitation Of Traffi...
Role of National Human Rights Commission in Rescue & Rehabilitation Of Traffi...Role of National Human Rights Commission in Rescue & Rehabilitation Of Traffi...
Role of National Human Rights Commission in Rescue & Rehabilitation Of Traffi...
 

Recently uploaded

原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
johncavitthouston
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 

Recently uploaded (20)

原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 

Internet cybercrime,ebanking and security

  • 2. CONTENT • INTERNET • BENEFIT OF INTERNET • INTERNET CHANGE OUR LIFE • DEMRIT OF INTERNET • CYBERCRIME • TYPE OF CYBERCRIME • E BANKING • ADVNTAGES OF E BANKING • DISADVANTAGE OF E BANKING • SECURITY OF E BANKING
  • 3. INTERNET • A network which provide large number of information and communication facilities and connect people together in easiest manner.
  • 4. BENEFIT OF INTERNET • Unlimited Source Of Information • Great Communication Media • Ideal Working And Studying Environment • Cost Effectiveness For Business • The Best Relaxing Tools
  • 5. INTERNET CHANGE OUR LIFE 1- PEOPLE ARE CONNCET MORE EASILY • In Past Year People are connected with the telegram , Telephone ,etc. It take more time to send information to one person to another. • But now a days People are connect with Social networking sites like what's app , Facebook ,Twitter, Instagram ,Etc. • These social networking sites make life more easier and comfortable and not take to much time to send information. • Specially if we are taking about villagers ,they are find out any information with the help of internet like employment news, Government Scheme ,Education Scheme , Awareness program ,Details of authorise hospitals ,etc.
  • 6. 2 Reading new paper • Only one Click provide several information around the world and people are easily updated their knowledge and also get information which is helpful for their present and future. With the help of internet it save the paper , people get information with the help of internet without facing any difficulties. • Internet new paper provide new like Current affairs, Sports news, Business news, Entertainment news, General awareness etc.
  • 7. ONLINE MARKETING AND ONLINE SHOPPING • Today it is easiest way to advertise most of the product or thing with the help of internet ,with the help of MARKETING. • Advertisement shown in internet with proper information about that product Or thing which buyer get full information and decide wheather it is useful Or Not. • Marketing of products Or thing is the easiest way in the internet ,which people are updated and buy those thing which they want. • Most of the people use these sites like Flipkart , Abof , Jabong, Amazon,for selling and buying Product and items with the help of nominal amount which is comfortable to both the parties. • Most of the grocery items are available in the internet which people buy their product in easiest manner with cheaper price.
  • 8. WATCHING MOVIE AND MUSIC • We can stream almost anything online now. Music is available from Shaven ,Wynk,Gannan.com. Movies are available from Netflix and Amazon movie .
  • 9. SHOWING OUR TALENT AND CREATIVIETY • Internet change the presumption of people people`s mind .If we have a talent and creativity we can upload these things with the help of these platform like –YOUTUBE, INSTAGRAM .Which rest of people learn and gain a knowledge with the help of internet and they never keep up in their life.
  • 10. DEMRITS OF INTERNET • Most of things are available in internet in easiest manner ,which amount of crime and security threat increase day by day • Internet is not 100 % secure which arise Hacking and stealing information from other people and use it in a wrongful manner. • Hacking create many obstruction which Viruses are spreading any personal system OR Mail which destroy our important data which cause lots of problem. • For Children ,Pornography and Paedophiles mislead the children and also affect their behaviour and their studies. • Student using large amount of internet surfing it`s effect concentration on the studies.
  • 11. CYBERCRIME • A crime which are exploiting individual personal right and steal our personal information use in a wrongful manner.
  • 12. TYPE OF CYBER CRIMES • Hacking • Cyber squatting • Phishing • Cyber Staking • Vishing • Email bombing • Spamming • Web jacking • Inditity theft and Credit Card Fraud • Software piracy
  • 13. HACKING • Hacking is a Crime which unauthorised access to data in a system. • Amount of hacking is increases day by day. So it is necessary to protect a system with the help of ANTIVRIUES Software. • Hacking is a crime under section 43 of the IT Act but at the same time, ethical hacking or better known as white collar hacking was considered legal. • Ethical hacking is also being taught by various professionals at schools and colleges. Under the amendment IT Act in 2008, the word ‘hacker was removed from the act. The reason for the same was that ethical hacking is taught by a lot of professionals at various schools and colleges, and colleges cannot teach anything illegal. So the same word should not be used. The amendment under section 66 and section 43 by removing the word hacking from the Act.
  • 14. SEC 43 OF IT ACT • Section 43 of IT Act is a civil offense where a person without permission of the owner accesses the computer and use any data or damages the data contained therein will come under civil liability. • Under the IT Act 2000, the compensation is provided for that person who is affected . However in the amendment made in 2008, this ceiling was removed. • Section 43A of the Information Technology Act, 2000 has describe reasonable security and procedures to be followed by those dealing or handling sensitive personal data or information.
  • 15. SEC 66A OF IT ACT • Section 66B Stated about for obtaining stolen computer data or information of another person uses in a wrongful manner without the concent of actual owner of computer. • The punishment of imprisonment for one year or a fine of rupees one lakh or both. Mens rea is play important role under section 66A. • What is the intention of that person who commited that offence weather they guilty of their offence Or Not. Because every thing is done without the consent of owner.
  • 16. PROCEDURE FILE A COMPLANINT ABOUT HACKING • A complaint can be filed at any cyber cell ,which is present in India and Complaint also file with the help of online process which we check our current status. • Firstly write an application to the head of the cyber cell department. • It consist following things • NAME • ADDRESS • E-MAIL ADDRESS • MOBILE/TELEPHONE NUMBER. • Second, submit the following documents with the Cyber cell; • Server id – Id files that get automatically with the server when files are opened. It saves a list of activities performed on day to day basis. • Hardcopy and soft copy of the affected material • A hard copy of the original web pages • Information about to the password which access the computer. • Name of suspected person who may be involve in this crime.
  • 17. CYBERSQUATTING • It is a illegal domain name registration or use for wrongful intention. • Cybersquatting can have a few different variations, but its primary purpose is to steal or misspell a domain name in order to profit from an increase in website . • Cybersquatting also includes advertisers who use domain names that are similar to popular, highly trafficked websites. • Cybersquatting is one of several types of cybercrimes. • These domain name use in wrongful manner to earn profit from goodwill of trade mark. These domain name mislead the people providing wrongful information.
  • 18. PHISHING • Phishing a information which contain such as usernames, passwords, and credit card details of individual person without their consent use in a wrongful manner through email and URL address.
  • 19. VISHING • the fraudulent person of making phone calls or leaving voice messages purporting to be from reputable companies in order to obtain individuals to personal information, such as bank details and credit card numbers. • Most of Victim give their details to Fraudulent person without knowing exact fact which that person use the money or any other information for their purpose with a wrongful intention.
  • 20. CYBER STAKING • Use of electronic communications to harass or frighten someone, for by sending emails, phone call or Message. • Cyberstalking exploitation of minors, be it sexual or otherwise.
  • 21. E MAIL BOMBING AND SPAMMING • IT is a cyber crime sending huge email which have no relevance to the mail box which directly affected to Server and not use in a proper manner. • SPAMMING -Send a bulk of message to a large number of Internet users for the purpose of annoying the users. Which contain improper information, Advertisement, Marketing of the product and sale.
  • 22. INDNDITITY THEFT AND CREDIT CARD FRAUD • Today ,large amount of cyber crime are occur which are trying to stolen personal information like Document, id number ,password etc. • Most of innocent person are providing their information which fraudulent person are gaining huge amount of money with the help of credit card number without the consent of that innocent person. • Most of the company or organization are affect to these fraudulent person are leak their personal information which affect company reputation. So it is our duty to safeguard our personal information and never be reveal to any outside person.
  • 23. Web jacking • The Web Jacking is a phishing technique that Attackers that are using this method are creating a fake website and when the victim opens the link a page appears with the message that the website has moved and they need to click another link. If the victim clicks the link that looks real he will redirected to a fake page. • These fake pages provided wrong information which victim move on a wrong track. • It is a quite interesting technique that tries to trick the user to believe that the webpage is real because the link is valid. Users must be aware of this type of attack especially when they are visiting a webpage that contains similar messages about websites or objects that have moved to new locations.
  • 24. Software piracy • Software piracy is the illegal activities which contain - • Copying • distribution, or use of software. • It is a profitable "business" which frundently person gain profit to sending information to one person to another person with a cheaper price. • It also affect our system with large amount of viruses contain in it.
  • 25. E -BANKING • It is that bank which people provide easiest method of money transaction with the help of Internet . Device of E Banking • 1 ATM • 2 Credit card • 3 Debit card • 4 Smart Card
  • 26. ADVANTAGE OF E BANKING • Convenience • Portability • Cost Savings • Industry Benefits • Helpful for shopping • Helpful for mobile recharge
  • 27. DISADVANTAGE OF E BANKING • Lack of Security • Illiteracy • Improper knowledge due to awareness. • Lack of technology • Improper handling of computer or mobile device.
  • 28. E BANKING SECURITY • Different banks are providing their customer which contain following things like • Security Login ID and Password or PIN. • Secure your computer and keep it up-to-date With latest antivirus. • Access your accounts from a secure location OR Place. • Bank provide awareness to their customer with the help of messages ,email , newspaper, etc. • Email notifications to alert • Sending current status of our bank account.
  • 29. CONCLUSION • Today Internet give new way of life which is helpful for each and every people. We can use internet in a proper manner without breaking any law and not violate any individual right. • It is duty of government and people to provide general awareness which no one people is affected to cybercrime and their information is safeguard in a proper manner and provide proper security to the Users. • E banking play drastically role in a society ,if we use in a systematic manner it give more advantage and helpful for future generation. • Use a Source on that manner which set example in society ,it is created for people learn something without facing any difficulties.