SlideShare a Scribd company logo
1 of 24
Presented by
Dheeraj Dani
7737401991
Contents:
 Introduction
 What is Cyber Crime?
 History of cyber crime
 Definition
 Categories of cyber crime
 CYBER ATTACKS STATISTICS 2013
 Cyber criminals
 What is IT Law and Cyber Law
 Phishing
 Botnet
 conclusion
INTRODUCTION
 The internet in India is growing rapidly. It has given

rise to new opportunities in every field we can think
of – be it entertainment, business, sports or
education.

 There are two sides to a coin. Internet also has its

own disadvantages. One of the major disadvantages
is Cyber crime – illegal activity committed on the
internet.
What is Cyber crime???
• Cyber crime is simply defined as crimes that are

directly related
computers.

• An

to

computers

and

using

increasing number of domestic and
international criminal activities are using the
Internet. Computers and other electronic
devices can be tools to commit crime or are
targeted by criminals. A personal computer
connected to the Internet without protection
may be infected with malicious software in
under a minute.
History of Cyber Crime
• In the early decades of modern information technology (IT),

computer crimes were largely committed
disgruntled and dishonest employees.

by

individual

• Physical damage to computer systems was a prominent threat

until the 1980s.

• Criminals often used unauthorized access to subvert security

systems as they modified data for financial gain or destroyed
data for revenge.

• As telecommunications technology spread throughout the IT

world, programmers began writing malicious software,
including self-replicating programs, to interfere with personal
computers.
DEFINING CYBER CRIME
 It’s an unlawful act wherein the computer is

either a tool or a target or both.

 Acts that are punishable by the Information

Technology Act.

 Cyber space is a virtual space that has become

as important as real space for business, politics,
and communities
CATEGORIES OF CIBER CRIME
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government
CYBER ATTACKS STATISTICS(2013)
CYBER CRIMINALS
Insider
Threats
Virus writers
(writes viruses to that
infect systems)

Information
warfare
(alternative to military
attacks)

Hactivists'

(teenage thrill-seekers to
sophisticated criminals)

(overloads e-mail servers
or hack web sites to send
political message)

Criminal
groups

Sensitive
intrusions

(attack systems &
steal password for
financial gain)

(employees)

Hackers

(sensitive information
is obtained via
computer intrusions)

Terrorists

Cyber
Warfare (attack by

(who have potential to
disrupt government
systems with computer
attacks)

sovereigns --- Crime or
Declaration of war)
What is IT Law and Cyber Law
 IT Law is a set of legal enactments, currently in

existence in several countries, which governs
the digital dissemination of both (digitalized)
information and software.

 Cyber law or Internet law is a term that

encapsulates the legal issues related to use of
the Internet. It is less a distinct field of law than
intellectual property or contract law, as it is a
domain covering many areas of law and
regulation. Some leading topics include internet
access and usage, privacy, freedom of
expression.
PHISHING
 A deception designed to steal valuable
personal data, such as credit card
numbers, passwords, account data, or other
information.
GLOBAL PHISHING SURVEY 2012
PEREVENTION
USE STRONG PASSWORDS
SECURE YOUR COMPUTER
1)

ACTIVATE YOUR FIREWALL

2)

USE ANTI-VIRUS

3)

BLOCK SPYWARE ATTACKS
 BE SOCIAL –MEDIA SAVVY
 SECURE YOUR MOBILR DEVICES.
 INSTALL LATEST OS.
 SECURE WIRELESS NETWORK.

 PROTECT YOUR E-IDENTITY
Why India?
A rapidly growing online
user base








121 Million Internet Users
65 Million Active Internet
Users, up by 28% from
51 million in 2010
50 Million users shop
online on Ecommerce and
Online Shopping Sites
46+ Million Social
Network Users
346 million mobile users
had subscribed to Data
Packages.
 The majority of cybercrimes are centered on fraud and








Phishing,
India is the third-most targeted country for Phishing attacks
after the US and the UK,
Social networks as well as ecommerce sites are major targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010,
6,850 .in and 4,150 .com domains were defaced during 2011,
15,000 sites hacked in 2011,
India is the number 1 country in the world for generating
spam.
Botnets
 A network of compromised computers that have

been infected with malicious code, and can be
remotely-controlled through commands sent
via the Internet by a botmaster
 Used for making money! Who pays:

 Internet Advertising companies for downloading

adware onto vulnerable PCs
 Companies who send spam, viruses and other
malware
 Google (unintentionally, see Clickbot.A summary)

 Used for the heck of it
Botnet Threat
 Botnets are a major threat to the Internet
because:
 Consist of a large pool of compromised

computers that are organized by a master.
 a.k.a., Zombie Armies
 Carry out sophisticated attacks to disrupt, gather
sensitive data, or increase armies
 Armies are in the 1000’s to aggregate computing
power
 Communication network allows bots to evolve on
compromised hosts
Attacking Behaviors
 Infecting new hosts



Social engineering and distribution of malicious emails or
other electronic communications (i.e. Instant Messaging)
Example - Email sent with botnet diguised as a harmless
attachment.

 Stealing personal information


Keylogger and Network sniffer technology used on
compromised systems to spy on users and compile personal
information

 Phishing and spam proxy


Aggregated computing power and proxy capability make
allow spammers to impact larger groups without being
traced.

 Distributed Denial of Service (DDoS)


Impair or eliminate availability of a network to extort or
disrupt business
Communication Protocols
 In most cases botnets use well defined and

accepted Communication Protocols.
Understanding the communication protocols
used helps to:

Determine the origins of a botnet attack and the
software being used

Allow researchers to decode conversations
happening between the bots and the masters


 There are two main Communication Protocols

used for bot attacks:



IRC
HTTP
Conclusion
 Cybercrime

greatly

affects

individuals, businesses, and national security due to
the pervasiveness ofthe

Internet

Different countries should work together and use
legal, organizational, and technological approaches
to combat cybercrime
• To reduce the damage to critical infrastructures
• To protect the Internet from being abused
It act and cyber crime
It act and cyber crime

More Related Content

What's hot (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security
cyber securitycyber security
cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Current threats and trends
Current threats and trendsCurrent threats and trends
Current threats and trendsLive Tecnologies
 
DDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and TrendsDDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and TrendsHLL
 
Dowloading as Deviance
Dowloading as DevianceDowloading as Deviance
Dowloading as DevianceJason Rutter
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

Viewers also liked (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Current threats and trends
Current threats and trendsCurrent threats and trends
Current threats and trends
 
DDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and TrendsDDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and Trends
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Dowloading as Deviance
Dowloading as DevianceDowloading as Deviance
Dowloading as Deviance
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Arab spring
Arab springArab spring
Arab spring
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to It act and cyber crime

CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Internet
InternetInternet
InternetJodip
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technologyBinu p jayan
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 

Similar to It act and cyber crime (20)

CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Internet
InternetInternet
Internet
 
English in written
English in writtenEnglish in written
English in written
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

It act and cyber crime

  • 2. Contents:  Introduction  What is Cyber Crime?  History of cyber crime  Definition  Categories of cyber crime  CYBER ATTACKS STATISTICS 2013  Cyber criminals  What is IT Law and Cyber Law  Phishing  Botnet  conclusion
  • 3. INTRODUCTION  The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education.  There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
  • 4. What is Cyber crime??? • Cyber crime is simply defined as crimes that are directly related computers. • An to computers and using increasing number of domestic and international criminal activities are using the Internet. Computers and other electronic devices can be tools to commit crime or are targeted by criminals. A personal computer connected to the Internet without protection may be infected with malicious software in under a minute.
  • 5. History of Cyber Crime • In the early decades of modern information technology (IT), computer crimes were largely committed disgruntled and dishonest employees. by individual • Physical damage to computer systems was a prominent threat until the 1980s. • Criminals often used unauthorized access to subvert security systems as they modified data for financial gain or destroyed data for revenge. • As telecommunications technology spread throughout the IT world, programmers began writing malicious software, including self-replicating programs, to interfere with personal computers.
  • 6. DEFINING CYBER CRIME  It’s an unlawful act wherein the computer is either a tool or a target or both.  Acts that are punishable by the Information Technology Act.  Cyber space is a virtual space that has become as important as real space for business, politics, and communities
  • 7. CATEGORIES OF CIBER CRIME 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government
  • 9. CYBER CRIMINALS Insider Threats Virus writers (writes viruses to that infect systems) Information warfare (alternative to military attacks) Hactivists' (teenage thrill-seekers to sophisticated criminals) (overloads e-mail servers or hack web sites to send political message) Criminal groups Sensitive intrusions (attack systems & steal password for financial gain) (employees) Hackers (sensitive information is obtained via computer intrusions) Terrorists Cyber Warfare (attack by (who have potential to disrupt government systems with computer attacks) sovereigns --- Crime or Declaration of war)
  • 10. What is IT Law and Cyber Law  IT Law is a set of legal enactments, currently in existence in several countries, which governs the digital dissemination of both (digitalized) information and software.  Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression.
  • 11. PHISHING  A deception designed to steal valuable personal data, such as credit card numbers, passwords, account data, or other information.
  • 13.
  • 14. PEREVENTION USE STRONG PASSWORDS SECURE YOUR COMPUTER 1) ACTIVATE YOUR FIREWALL 2) USE ANTI-VIRUS 3) BLOCK SPYWARE ATTACKS
  • 15.  BE SOCIAL –MEDIA SAVVY  SECURE YOUR MOBILR DEVICES.  INSTALL LATEST OS.  SECURE WIRELESS NETWORK.  PROTECT YOUR E-IDENTITY
  • 16. Why India? A rapidly growing online user base      121 Million Internet Users 65 Million Active Internet Users, up by 28% from 51 million in 2010 50 Million users shop online on Ecommerce and Online Shopping Sites 46+ Million Social Network Users 346 million mobile users had subscribed to Data Packages.
  • 17.  The majority of cybercrimes are centered on fraud and        Phishing, India is the third-most targeted country for Phishing attacks after the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010, 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.
  • 18. Botnets  A network of compromised computers that have been infected with malicious code, and can be remotely-controlled through commands sent via the Internet by a botmaster  Used for making money! Who pays:  Internet Advertising companies for downloading adware onto vulnerable PCs  Companies who send spam, viruses and other malware  Google (unintentionally, see Clickbot.A summary)  Used for the heck of it
  • 19. Botnet Threat  Botnets are a major threat to the Internet because:  Consist of a large pool of compromised computers that are organized by a master.  a.k.a., Zombie Armies  Carry out sophisticated attacks to disrupt, gather sensitive data, or increase armies  Armies are in the 1000’s to aggregate computing power  Communication network allows bots to evolve on compromised hosts
  • 20. Attacking Behaviors  Infecting new hosts   Social engineering and distribution of malicious emails or other electronic communications (i.e. Instant Messaging) Example - Email sent with botnet diguised as a harmless attachment.  Stealing personal information  Keylogger and Network sniffer technology used on compromised systems to spy on users and compile personal information  Phishing and spam proxy  Aggregated computing power and proxy capability make allow spammers to impact larger groups without being traced.  Distributed Denial of Service (DDoS)  Impair or eliminate availability of a network to extort or disrupt business
  • 21. Communication Protocols  In most cases botnets use well defined and accepted Communication Protocols. Understanding the communication protocols used helps to: Determine the origins of a botnet attack and the software being used  Allow researchers to decode conversations happening between the bots and the masters   There are two main Communication Protocols used for bot attacks:   IRC HTTP
  • 22. Conclusion  Cybercrime greatly affects individuals, businesses, and national security due to the pervasiveness ofthe Internet Different countries should work together and use legal, organizational, and technological approaches to combat cybercrime • To reduce the damage to critical infrastructures • To protect the Internet from being abused