SlideShare a Scribd company logo
Introduction to Cybercrime
ILO 7016.1: Understand the concept of cybercrime and its
effect on outside world
Contents
Cybercrime definition and origins of the world
Cybercrime and information security
Classifications of cybercrime
Cybercrime and the Indian ITA 2000
A global Perspective on cybercrimes.
Cyber Crime
The term cybercrime is used to describe a unlawful activity in which computer or
computing devices such as smartphones, tablets, Personal Digital Assistants
(PDAs), etc. which are stand alone or a part of a network are used as a tool or/and
target of criminal activity. It is often committed by the people of destructive and
criminal mindset either for revenge, greed or adventure.
Cybercrime and information security
Cybercrime and information security are related concepts, but they have distinct meanings and focus areas.
Cybercrime:
● Nature: Cybercrime refers to criminal activities that are conducted through digital means, such as computers,
networks, and the internet. It involves the use of technology to commit illegal acts or harm individuals,
organizations, or governments.
● Intent: The primary intent of cybercriminals is to gain unauthorized access, steal sensitive information, disrupt
services, defraud individuals or organizations, or otherwise engage in malicious activities for financial gain,
political motives, or personal reasons.
● Examples: Cybercrimes include hacking, phishing, malware distribution, identity theft, credit card fraud,
ransomware attacks, cyberbullying, online scams, and various forms of online harassment.
● Legal Consequences: Cybercrime is a violation of the law and can lead to criminal charges, prosecution, and
penalties if the perpetrators are caught and successfully prosecuted.
Cybercrime and information security
Information Security:
● Nature: Information security, also known as cybersecurity, involves protecting digital information from
unauthorized access, disclosure, alteration, or destruction. It focuses on safeguarding the
confidentiality, integrity, and availability of data and information systems.
● Intent: The primary intent of information security is to prevent unauthorized access, data breaches, and
cyberattacks by implementing a range of security measures and best practices.
● Examples: Information security practices include encryption, access controls, firewalls, intrusion
detection systems, antivirus software, regular security assessments, employee training, incident
response planning, and disaster recovery.
● Legal Consequences: Information security is a proactive approach aimed at preventing and mitigating
cybercrimes. Organizations and individuals take steps to protect themselves against cyber threats and
vulnerabilities to avoid the negative legal, financial, and reputational consequences of cyberattacks.
Cybercrime and information security
● Cybercrime involves illegal activities carried out using digital
technology, often with the intent to cause harm, whereas information
security focuses on protecting data, systems, and networks from cyber
threats and vulnerabilities.
● While cybercrime is concerned with the actions of malicious actors,
information security focuses on measures to prevent and mitigate those
actions to ensure the safe and secure use of digital technology.
History of Internet
The history of the Internet is a complex and multifaceted story that spans several decades. Here is a brief overview
of key milestones and developments in the history of the Internet:
● 1960s - The Birth of ARPANET: The precursor to the Internet, ARPANET, was created by the U.S.
Department of Defense's Advanced Research Projects Agency (ARPA, now known as DARPA) in the late
1960s. The goal was to establish a reliable communication network that could withstand a nuclear attack.
● 1970s - TCP/IP and Email: The development of the Transmission Control Protocol (TCP) and the Internet
Protocol (IP) laid the foundation for the modern Internet architecture. Ray Tomlinson sent the first networked
email in 1971, using the "@" symbol to denote sending messages between different hosts.
● 1980s - Domain Name System (DNS) and Usenet: The Domain Name System was introduced in the 1980s,
providing a hierarchical naming system for websites and servers. Usenet, a precursor to online forums and
discussion boards, was also established during this time.
History of Internet
● Early 1990s - World Wide Web (WWW): Tim Berners-Lee's creation of the World Wide Web in 1989
marked a significant breakthrough. The WWW allowed documents to be linked via hyperlinks and
viewed through web browsers, making the Internet accessible to a wider audience.
● Mid-1990s - Commercialization and Browser Wars: The mid-1990s saw a surge in Internet usage and
the commercialization of the web. The "browser wars" between Netscape Navigator and Microsoft's
Internet Explorer fueled rapid development and innovation.
● Late 1990s - Dot-Com Bubble: The late 1990s brought a period of exuberant investment in Internet-
related businesses, resulting in the dot-com bubble. Many companies experienced rapid growth and
subsequent crashes.
● Early 2000s - Broadband and Social Media: The early 2000s saw increased adoption of broadband
internet connections, enabling faster data transfer. Social media platforms like Friendster, MySpace,
and later Facebook began to reshape online interactions.
History of Internet
● Mid-2000s - Web 2.0 and Mobile Internet: The concept of Web 2.0 emerged, emphasizing user-
generated content and collaborative platforms. The proliferation of mobile devices further expanded
internet access and usage.
● Late 2000s - Cloud Computing and Streaming: Cloud computing gained prominence, allowing users to
store and access data online. Streaming services like YouTube and Netflix transformed how users
consume media.
● 2010s - IoT, AI, and Mobile Apps: The Internet of Things (IoT) connected everyday objects to the
internet, while artificial intelligence (AI) and machine learning became integral parts of online
experiences. The rise of smartphones led to the dominance of mobile apps.
● Present and Future - 5G and Beyond: The present era is characterized by the continued expansion of
internet access, the growth of e-commerce, the development of 5G networks for faster connectivity,
and ongoing innovations in areas like virtual reality, augmented reality, and blockchain technology.
Classification of Cyber Crimes
The cyber criminal could be internal or external to the organization facing the
cyber attack. Based on this fact, the cyber crime could be categorized into two
types:
1. Insider Attack
2. External Attack
Insider Attack
An attack to the network or the computer system by some person with authorized system access is
known as insider attack.
It is generally performed by dissatisfied or unhappy inside employees or contractors. The motive of
the insider attack could be revenge or greed.
It is comparatively easy for an insider to perform a cyber attack as he is well aware of the policies,
processes, IT architecture and weakness of the security system.
Moreover, the attacker have an access to the network. Therefore it is comparatively easy for a
insider attacker to steal sensitive information, crash the network, etc.
In most of the cases the reason for insider attack is when a employee is fired or assigned new
roles in an organization, and the role is not reflected in the IT policies.
This opens a vulnerability window for the attacker. The insider attack could be prevented by
planning and installing an Internal intrusion detection systems (IDS) in the organization.
External Attack:
When the attacker is either hired by an insider or an external entity to the
organization, it is known as external attack.
The organization which is a victim of cyber attack not only faces financial loss but
also the loss of reputation.
Since the attacker is external to the organization, so these attackers usually scan
and gathering information.
An experienced network/security administrator keeps regular eye on the log
generated by the firewalls as external attacks can be traced out by carefully
analyzing these firewall logs.
Also, Intrusion Detection Systems are installed to keep an eye on external attacks.
Classification of Cyber Crimes
The cyber attacks can also be classified as structure attacks and unstructured
attacks based on the level of maturity of the attacker. Some of the authors have
classified these attacks as a form of external attacks but there is precedence of
the cases when a structured attack was performed by an internal employee. This
happens in the case when the competitor company wants the future strategy of an
organization on certain points. The attacker may strategically gain access to the
company as an employee and access the required information.
Classification of Cyber Crimes
Unstructured attacks: These attacks are generally performed by amatures who
don‟t have any predefined motives to perform the cyber attack. Usually these
amatures try to test a tool readily available over the internet on the network of a
random company.
Classification of Cyber Crimes
Structure Attack: These types of attacks are performed by highly skilled and
experienced people and the motives of these attacks are clear in their mind. They
have access to sophisticated tools and technologies to gain access to other
networks without being noticed by their Intrusion Detection Systems(IDSs).
Moreover, these attacker have the necessary expertise to develop or modify the
existing tools to satisfy their purpose. These types of attacks are usually
performed by professional criminals, by a country on other rival countries,
politicians to damage the image of the rival person or the country, terrorists, rival
companies, etc.
Reasons for Commission of Cyber Crimes
There are many reasons which act as a catalyst in the growth of cyber crime.
Some of the prominent reasons are:
a. Money: People are motivated towards committing cyber crime is to make quick
and easy money.
b. Revenge: Some people try to take revenge with other
person/organization/society/ caste or religion by defaming its reputation or
bringing economical or physical loss. This comes under the category of cyber
terrorism.
c. Fun: The amateur do cyber crime for fun. They just want to test the latest tool
they have encountered.
d. Recognition: It is considered to be pride if someone hack the highly secured
networks like defense sites or networks.
e. Anonymity- Many time the anonymity that a cyberspace provide motivates the
person to commit cyber crime as it is much easy to commit a cybercrime over the
cyber space and remain anonymous as compared to real world. It is much easier
to get away with criminal activity in a cyber world than in the real world. There is a
strong sense of anonymity than can draw otherwise respectable citizens to
abandon their ethics in pursuit personal gain.
INDIAN IT ACT
The Indian IT Act refers to the Information Technology Act,
2000, which is an important legislation in India that deals with
electronic transactions, digital signatures, cybercrimes, and
electronic governance. The act was enacted to provide a legal
framework for facilitating electronic commerce, promoting the
use of electronic records, and addressing issues related to
cybersecurity and data protection.
Here are some key features and provisions of the Indian IT Act:
● Digital Signatures: The IT Act recognizes digital signatures as legally valid and
equivalent to physical signatures. It provides the legal framework for the use of digital
signatures in electronic transactions.
● Electronic Governance: The act emphasizes the use of electronic means for
government-related activities and services to ensure efficiency and transparency.
● Cybercrimes: The IT Act defines various cyber offenses and their corresponding
penalties. It covers offenses such as unauthorized access to computer systems, data
theft, hacking, and distribution of malicious software.
● Data Protection and Privacy: The act includes provisions for the protection of sensitive
personal data and information. It establishes guidelines for handling and processing
personal data and imposes penalties for violations.
● Intermediary Liability: The act addresses the liability of intermediaries (such as internet
service providers and social media platforms) for content posted by users on their
platforms. It provides certain safe harbor provisions to protect intermediaries from
liability for user-generated content, subject to compliance with certain conditions.
● Computer-related Offenses: The act deals with offenses related to computer systems,
including unauthorized access, hacking, and introducing viruses or malware.
● Cyber Appellate Tribunal: The act established the Cyber Appellate Tribunal to hear
appeals against orders passed by adjudicating officers under the act.
● Adjudicating Officers and Authorities: The act designates certain officers and
authorities to hear and decide on matters related to cyber offenses and data
protection.
Amendments to IT Act
It's important to note that the Indian IT Act has been amended over the
years to keep pace with technological advancements and changing cyber
threats. Furthermore, India has introduced additional regulations related
to data protection, including the Personal Data Protection Bill, 2019, which
is currently under consideration by the Indian Parliament. This bill aims to
provide a comprehensive framework for the protection of personal data
and privacy in India.
Amendments to IT Act
the Indian Information Technology Act, 2000 (IT Act) has undergone several amendments over
the years to address the changing landscape of technology and digital transactions. Some key
amendments to the IT Act include:
Information Technology (Amendment) Act, 2008: This amendment expanded the scope of
the original IT Act to cover new technology developments. It introduced provisions related
to data protection, security practices, penalties for cybercrimes, and the establishment of
the Indian Computer Emergency Response Team (CERT-In).
Amendments to IT Act
● Information Technology (Amendment) Act, 2009: This amendment further strengthened provisions related
to cybersecurity, data protection, and the powers of law enforcement agencies to investigate and prevent
cybercrimes.
● Information Technology (Amendment) Act, 2011: This amendment introduced changes to address issues
related to electronic signatures, digital signatures, and the facilitation of electronic governance.
● Information Technology (Amendment) Act, 2018: This significant amendment introduced changes to the IT
Act to align it with emerging technologies and digital initiatives. It included provisions related to electronic
authentication, electronic evidence, and penalties for offenses such as cyberbullying and child pornography.
● Data Protection Bill (Proposed): While not an amendment to the IT Act itself, the proposed Data Protection
Bill aims to establish comprehensive data protection and privacy regulations in India. Once enacted, this bill
will work in conjunction with the IT Act to regulate the collection, processing, and use of personal data.
https://www.meity.gov.in/content/information-technology-act-2000
https://www.meity.gov.in/content/cyber-laws
cyber crimes mentioned in indian it act
The Indian IT Act, 2000, defines several cybercrimes and prescribes penalties for them. Some of the
cybercrimes mentioned in the act are as follows:
● Tampering with Computer Source Code (Section 65): This offense involves intentionally altering,
damaging, deleting, or causing any harm to a computer source code. It carries a penalty of
imprisonment up to three years or a fine up to two lakh rupees or both.
● Hacking (Section 66): Hacking refers to unauthorized access to a computer system or network. It
includes introducing a virus, worm, or other malicious code to the system. The act prescribes
imprisonment up to three years or a fine up to five lakh rupees or both for this offense.
● Data Theft (Section 66B): Data theft involves dishonestly receiving or retaining any stolen data,
knowing or having reason to believe that it is stolen. It is punishable with imprisonment up to three
years or a fine up to one lakh rupees or both.
● Identity Theft (Section 66C): Identity theft includes using someone else's identity for illegal
purposes. It can lead to imprisonment up to three years or a fine up to one lakh rupees or both.
● Publishing or Transmitting Obscene Material (Section 67): This offense involves publishing or transmitting
obscene material electronically. It carries a penalty of imprisonment up to three years or a fine up to five
lakh rupees or both.
● Child Pornography (Section 67B): Producing, publishing, transmitting, or causing to be transmitted child
pornography is an offense punishable with imprisonment up to seven years and a fine.
● Cyber Terrorism (Section 66F): Cyber terrorism involves acts that threaten the unity, integrity, security, or
sovereignty of India or create a situation that leads to mass disruption of essential services using a
computer resource. It carries a punishment of life imprisonment.
● Unauthorized Access to Computer Material (Section 43): Unauthorized access to computer material is a
civil offense, and the act provides for compensation to the affected party.
These are just a few examples of cyber crimes mentioned in the Indian IT Act. The act also includes provisions for
other offenses related to breach of confidentiality, privacy, and other computer-related crimes. The penalties for
these offenses vary depending on the severity of the crime and its impact on individuals, organizations, or the
country as a whole.
IT LAWS IN OTHER COUNTRIES
various countries have enacted their own information technology laws to regulate electronic
transactions, data protection, cybersecurity, and other technology-related matters. The names and
details of these acts may have changed or evolved over time, so it's essential to verify the latest
information from official government sources. Here is a list of some notable IT acts from different
countries:
● United States: The United States has several laws related to information technology,
including the Computer Fraud and Abuse Act (CFAA) and the Digital Millennium Copyright Act
(DMCA).
● European Union: The General Data Protection Regulation (GDPR) is a significant data
protection law that applies to all EU member states.
● India: The Information Technology Act, 2000, governs electronic transactions, cybersecurity,
and data protection in India.
● United Kingdom: The Data Protection Act 2018 and the Computer Misuse Act 1990 are some of the
key IT-related laws in the UK.
● Canada: Canada has the Personal Information Protection and Electronic Documents Act (PIPEDA)
and the Canadian Anti-Spam Legislation (CASL).
● Australia: Australia has the Privacy Act 1988, which includes the Notifiable Data Breaches (NDB)
scheme, and the Cybercrime Act 2001.
● Singapore: Singapore's Personal Data Protection Act (PDPA) and the Computer Misuse and
Cybersecurity Act (CMCA) are the relevant IT laws.
● China: China has the Cybersecurity Law, which covers various aspects of cybersecurity, data
protection, and internet governance.
● Japan: Japan's Act on the Protection of Personal Information (APPI) is the primary law for data
protection.
● Brazil: Brazil has the Lei Geral de Proteção de Dados Pessoais (LGPD), which is a comprehensive
data protection law.
● South Africa: The Protection of Personal Information Act (POPIA) is South Africa's data protection
law.
These are just a few examples, and many other countries have their own IT and data protection laws to regulate technology-related
activities within their jurisdictions. It is essential to consult official government sources for the latest and most accurate information
cyber crime has been largely reported in india
several cyber crimes have been largely reported in India. Some of the prominent cybercrimes
that have affected individuals, businesses, and organizations in India include:
● Phishing: Phishing attacks involve fraudulent attempts to trick individuals into revealing
sensitive information, such as login credentials, credit card details, or personal
information. Cybercriminals often use emails, websites, or messages that appear
legitimate to deceive victims.
● Online Fraud: Online fraud encompasses various forms of scams, including lottery
scams, job scams, investment scams, and fake shopping websites. These scams aim
to steal money from unsuspecting victims by luring them into fraudulent transactions
or investments.
cyber crime has been largely reported in india
● Cyber Extortion: Cyber extortion involves threatening individuals or organizations with harm or
damage unless a ransom is paid. Ransomware attacks, where attackers encrypt victims' data and
demand a ransom for its release, are a common form of cyber extortion.
● Social Media Hacking: Cybercriminals may hack into social media accounts to gain unauthorized
access, steal personal information, or spread false information.
● Data Breaches: Data breaches involve unauthorized access to sensitive information, such as
personal data, financial records, or intellectual property. Breaches can occur due to security
vulnerabilities in systems or through insider threats.
● Online Harassment and Cyberbullying: Harassment and cyberbullying occur when individuals use
digital platforms to intimidate, threaten, or humiliate others.
● Identity Theft: Cybercriminals may steal personal information to impersonate individuals and
commit financial fraud or other crimes.
● Cyber Attacks on Government and Private Organizations: Government websites and private
organizations have been targeted by cyber attacks for various reasons, including hacking for
political reasons, financial gain, or to cause disruption.
Cybercrime trends can change over time as new technologies emerge and
cybercriminals adapt their tactics. The Indian government and law
enforcement agencies continuously work to combat cybercrimes and
enhance cybersecurity measures to protect individuals and organizations
from digital threats.
References
Nina Godbole, Sunit Belapure, Cyber Security, Wiley India, New Delhi

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
AniketPandit18
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
Raza_Abidi
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
Mukund Kumar Bharti
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
AnandKaGe
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Hacking
HackingHacking
Hacking
Asma Khan
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 

What's hot (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking
HackingHacking
Hacking
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 

Similar to Module 1- Introduction to Cybercrime.pptx

Cyber security
 Cyber security Cyber security
Cyber security
Tanu Basoiya
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
Suleiman55
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
TanushreeChakraborty27
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
Sitamarhi Institute of Technology
 
C018131821
C018131821C018131821
C018131821
IOSR Journals
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
Skippedltd
 
Cybercrime
CybercrimeCybercrime
Cybercrime
MobeenaJavid
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
null - The Open Security Community
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
tanyamudgal4
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
SharmilaMore5
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Cyber security
Cyber security Cyber security
Cyber security
Shivam Yadav
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
Arivukkarasu Dhanapal
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey96
 

Similar to Module 1- Introduction to Cybercrime.pptx (20)

Cyber security
 Cyber security Cyber security
Cyber security
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
C018131821
C018131821C018131821
C018131821
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber security
Cyber security Cyber security
Cyber security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 

More from nikshaikh786

Module 2_ Divide and Conquer Approach.pptx
Module 2_ Divide and Conquer Approach.pptxModule 2_ Divide and Conquer Approach.pptx
Module 2_ Divide and Conquer Approach.pptx
nikshaikh786
 
Module 1_ Introduction.pptx
Module 1_ Introduction.pptxModule 1_ Introduction.pptx
Module 1_ Introduction.pptx
nikshaikh786
 
Module 1_ Introduction to Mobile Computing.pptx
Module 1_  Introduction to Mobile Computing.pptxModule 1_  Introduction to Mobile Computing.pptx
Module 1_ Introduction to Mobile Computing.pptx
nikshaikh786
 
Module 2_ GSM Mobile services.pptx
Module 2_  GSM Mobile services.pptxModule 2_  GSM Mobile services.pptx
Module 2_ GSM Mobile services.pptx
nikshaikh786
 
MODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptxMODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptx
nikshaikh786
 
MODULE 5 _ Mining frequent patterns and associations.pptx
MODULE 5 _ Mining frequent patterns and associations.pptxMODULE 5 _ Mining frequent patterns and associations.pptx
MODULE 5 _ Mining frequent patterns and associations.pptx
nikshaikh786
 
DWM-MODULE 6.pdf
DWM-MODULE 6.pdfDWM-MODULE 6.pdf
DWM-MODULE 6.pdf
nikshaikh786
 
TCS MODULE 6.pdf
TCS MODULE 6.pdfTCS MODULE 6.pdf
TCS MODULE 6.pdf
nikshaikh786
 
Module 3_ Classification.pptx
Module 3_ Classification.pptxModule 3_ Classification.pptx
Module 3_ Classification.pptx
nikshaikh786
 
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
nikshaikh786
 
Module 1_Data Warehousing Fundamentals.pptx
Module 1_Data Warehousing Fundamentals.pptxModule 1_Data Warehousing Fundamentals.pptx
Module 1_Data Warehousing Fundamentals.pptx
nikshaikh786
 
MODULE 5- EDA.pptx
MODULE 5- EDA.pptxMODULE 5- EDA.pptx
MODULE 5- EDA.pptx
nikshaikh786
 
MODULE 4-Text Analytics.pptx
MODULE 4-Text Analytics.pptxMODULE 4-Text Analytics.pptx
MODULE 4-Text Analytics.pptx
nikshaikh786
 
Module 3 - Time Series.pptx
Module 3 - Time Series.pptxModule 3 - Time Series.pptx
Module 3 - Time Series.pptx
nikshaikh786
 
Module 2_ Regression Models..pptx
Module 2_ Regression Models..pptxModule 2_ Regression Models..pptx
Module 2_ Regression Models..pptx
nikshaikh786
 
MODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptxMODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptx
nikshaikh786
 
IOE MODULE 6.pptx
IOE MODULE 6.pptxIOE MODULE 6.pptx
IOE MODULE 6.pptx
nikshaikh786
 
MAD&PWA VIVA QUESTIONS.pdf
MAD&PWA VIVA QUESTIONS.pdfMAD&PWA VIVA QUESTIONS.pdf
MAD&PWA VIVA QUESTIONS.pdf
nikshaikh786
 
VIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdfVIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdf
nikshaikh786
 
IOE MODULE 5.pptx
IOE MODULE 5.pptxIOE MODULE 5.pptx
IOE MODULE 5.pptx
nikshaikh786
 

More from nikshaikh786 (20)

Module 2_ Divide and Conquer Approach.pptx
Module 2_ Divide and Conquer Approach.pptxModule 2_ Divide and Conquer Approach.pptx
Module 2_ Divide and Conquer Approach.pptx
 
Module 1_ Introduction.pptx
Module 1_ Introduction.pptxModule 1_ Introduction.pptx
Module 1_ Introduction.pptx
 
Module 1_ Introduction to Mobile Computing.pptx
Module 1_  Introduction to Mobile Computing.pptxModule 1_  Introduction to Mobile Computing.pptx
Module 1_ Introduction to Mobile Computing.pptx
 
Module 2_ GSM Mobile services.pptx
Module 2_  GSM Mobile services.pptxModule 2_  GSM Mobile services.pptx
Module 2_ GSM Mobile services.pptx
 
MODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptxMODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptx
 
MODULE 5 _ Mining frequent patterns and associations.pptx
MODULE 5 _ Mining frequent patterns and associations.pptxMODULE 5 _ Mining frequent patterns and associations.pptx
MODULE 5 _ Mining frequent patterns and associations.pptx
 
DWM-MODULE 6.pdf
DWM-MODULE 6.pdfDWM-MODULE 6.pdf
DWM-MODULE 6.pdf
 
TCS MODULE 6.pdf
TCS MODULE 6.pdfTCS MODULE 6.pdf
TCS MODULE 6.pdf
 
Module 3_ Classification.pptx
Module 3_ Classification.pptxModule 3_ Classification.pptx
Module 3_ Classification.pptx
 
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
 
Module 1_Data Warehousing Fundamentals.pptx
Module 1_Data Warehousing Fundamentals.pptxModule 1_Data Warehousing Fundamentals.pptx
Module 1_Data Warehousing Fundamentals.pptx
 
MODULE 5- EDA.pptx
MODULE 5- EDA.pptxMODULE 5- EDA.pptx
MODULE 5- EDA.pptx
 
MODULE 4-Text Analytics.pptx
MODULE 4-Text Analytics.pptxMODULE 4-Text Analytics.pptx
MODULE 4-Text Analytics.pptx
 
Module 3 - Time Series.pptx
Module 3 - Time Series.pptxModule 3 - Time Series.pptx
Module 3 - Time Series.pptx
 
Module 2_ Regression Models..pptx
Module 2_ Regression Models..pptxModule 2_ Regression Models..pptx
Module 2_ Regression Models..pptx
 
MODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptxMODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptx
 
IOE MODULE 6.pptx
IOE MODULE 6.pptxIOE MODULE 6.pptx
IOE MODULE 6.pptx
 
MAD&PWA VIVA QUESTIONS.pdf
MAD&PWA VIVA QUESTIONS.pdfMAD&PWA VIVA QUESTIONS.pdf
MAD&PWA VIVA QUESTIONS.pdf
 
VIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdfVIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdf
 
IOE MODULE 5.pptx
IOE MODULE 5.pptxIOE MODULE 5.pptx
IOE MODULE 5.pptx
 

Recently uploaded

addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 

Recently uploaded (20)

addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 

Module 1- Introduction to Cybercrime.pptx

  • 1. Introduction to Cybercrime ILO 7016.1: Understand the concept of cybercrime and its effect on outside world
  • 2. Contents Cybercrime definition and origins of the world Cybercrime and information security Classifications of cybercrime Cybercrime and the Indian ITA 2000 A global Perspective on cybercrimes.
  • 3. Cyber Crime The term cybercrime is used to describe a unlawful activity in which computer or computing devices such as smartphones, tablets, Personal Digital Assistants (PDAs), etc. which are stand alone or a part of a network are used as a tool or/and target of criminal activity. It is often committed by the people of destructive and criminal mindset either for revenge, greed or adventure.
  • 4. Cybercrime and information security Cybercrime and information security are related concepts, but they have distinct meanings and focus areas. Cybercrime: ● Nature: Cybercrime refers to criminal activities that are conducted through digital means, such as computers, networks, and the internet. It involves the use of technology to commit illegal acts or harm individuals, organizations, or governments. ● Intent: The primary intent of cybercriminals is to gain unauthorized access, steal sensitive information, disrupt services, defraud individuals or organizations, or otherwise engage in malicious activities for financial gain, political motives, or personal reasons. ● Examples: Cybercrimes include hacking, phishing, malware distribution, identity theft, credit card fraud, ransomware attacks, cyberbullying, online scams, and various forms of online harassment. ● Legal Consequences: Cybercrime is a violation of the law and can lead to criminal charges, prosecution, and penalties if the perpetrators are caught and successfully prosecuted.
  • 5. Cybercrime and information security Information Security: ● Nature: Information security, also known as cybersecurity, involves protecting digital information from unauthorized access, disclosure, alteration, or destruction. It focuses on safeguarding the confidentiality, integrity, and availability of data and information systems. ● Intent: The primary intent of information security is to prevent unauthorized access, data breaches, and cyberattacks by implementing a range of security measures and best practices. ● Examples: Information security practices include encryption, access controls, firewalls, intrusion detection systems, antivirus software, regular security assessments, employee training, incident response planning, and disaster recovery. ● Legal Consequences: Information security is a proactive approach aimed at preventing and mitigating cybercrimes. Organizations and individuals take steps to protect themselves against cyber threats and vulnerabilities to avoid the negative legal, financial, and reputational consequences of cyberattacks.
  • 6. Cybercrime and information security ● Cybercrime involves illegal activities carried out using digital technology, often with the intent to cause harm, whereas information security focuses on protecting data, systems, and networks from cyber threats and vulnerabilities. ● While cybercrime is concerned with the actions of malicious actors, information security focuses on measures to prevent and mitigate those actions to ensure the safe and secure use of digital technology.
  • 7. History of Internet The history of the Internet is a complex and multifaceted story that spans several decades. Here is a brief overview of key milestones and developments in the history of the Internet: ● 1960s - The Birth of ARPANET: The precursor to the Internet, ARPANET, was created by the U.S. Department of Defense's Advanced Research Projects Agency (ARPA, now known as DARPA) in the late 1960s. The goal was to establish a reliable communication network that could withstand a nuclear attack. ● 1970s - TCP/IP and Email: The development of the Transmission Control Protocol (TCP) and the Internet Protocol (IP) laid the foundation for the modern Internet architecture. Ray Tomlinson sent the first networked email in 1971, using the "@" symbol to denote sending messages between different hosts. ● 1980s - Domain Name System (DNS) and Usenet: The Domain Name System was introduced in the 1980s, providing a hierarchical naming system for websites and servers. Usenet, a precursor to online forums and discussion boards, was also established during this time.
  • 8. History of Internet ● Early 1990s - World Wide Web (WWW): Tim Berners-Lee's creation of the World Wide Web in 1989 marked a significant breakthrough. The WWW allowed documents to be linked via hyperlinks and viewed through web browsers, making the Internet accessible to a wider audience. ● Mid-1990s - Commercialization and Browser Wars: The mid-1990s saw a surge in Internet usage and the commercialization of the web. The "browser wars" between Netscape Navigator and Microsoft's Internet Explorer fueled rapid development and innovation. ● Late 1990s - Dot-Com Bubble: The late 1990s brought a period of exuberant investment in Internet- related businesses, resulting in the dot-com bubble. Many companies experienced rapid growth and subsequent crashes. ● Early 2000s - Broadband and Social Media: The early 2000s saw increased adoption of broadband internet connections, enabling faster data transfer. Social media platforms like Friendster, MySpace, and later Facebook began to reshape online interactions.
  • 9. History of Internet ● Mid-2000s - Web 2.0 and Mobile Internet: The concept of Web 2.0 emerged, emphasizing user- generated content and collaborative platforms. The proliferation of mobile devices further expanded internet access and usage. ● Late 2000s - Cloud Computing and Streaming: Cloud computing gained prominence, allowing users to store and access data online. Streaming services like YouTube and Netflix transformed how users consume media. ● 2010s - IoT, AI, and Mobile Apps: The Internet of Things (IoT) connected everyday objects to the internet, while artificial intelligence (AI) and machine learning became integral parts of online experiences. The rise of smartphones led to the dominance of mobile apps. ● Present and Future - 5G and Beyond: The present era is characterized by the continued expansion of internet access, the growth of e-commerce, the development of 5G networks for faster connectivity, and ongoing innovations in areas like virtual reality, augmented reality, and blockchain technology.
  • 10. Classification of Cyber Crimes The cyber criminal could be internal or external to the organization facing the cyber attack. Based on this fact, the cyber crime could be categorized into two types: 1. Insider Attack 2. External Attack
  • 11. Insider Attack An attack to the network or the computer system by some person with authorized system access is known as insider attack. It is generally performed by dissatisfied or unhappy inside employees or contractors. The motive of the insider attack could be revenge or greed. It is comparatively easy for an insider to perform a cyber attack as he is well aware of the policies, processes, IT architecture and weakness of the security system. Moreover, the attacker have an access to the network. Therefore it is comparatively easy for a insider attacker to steal sensitive information, crash the network, etc. In most of the cases the reason for insider attack is when a employee is fired or assigned new roles in an organization, and the role is not reflected in the IT policies. This opens a vulnerability window for the attacker. The insider attack could be prevented by planning and installing an Internal intrusion detection systems (IDS) in the organization.
  • 12. External Attack: When the attacker is either hired by an insider or an external entity to the organization, it is known as external attack. The organization which is a victim of cyber attack not only faces financial loss but also the loss of reputation. Since the attacker is external to the organization, so these attackers usually scan and gathering information. An experienced network/security administrator keeps regular eye on the log generated by the firewalls as external attacks can be traced out by carefully analyzing these firewall logs. Also, Intrusion Detection Systems are installed to keep an eye on external attacks.
  • 13. Classification of Cyber Crimes The cyber attacks can also be classified as structure attacks and unstructured attacks based on the level of maturity of the attacker. Some of the authors have classified these attacks as a form of external attacks but there is precedence of the cases when a structured attack was performed by an internal employee. This happens in the case when the competitor company wants the future strategy of an organization on certain points. The attacker may strategically gain access to the company as an employee and access the required information.
  • 14. Classification of Cyber Crimes Unstructured attacks: These attacks are generally performed by amatures who don‟t have any predefined motives to perform the cyber attack. Usually these amatures try to test a tool readily available over the internet on the network of a random company.
  • 15. Classification of Cyber Crimes Structure Attack: These types of attacks are performed by highly skilled and experienced people and the motives of these attacks are clear in their mind. They have access to sophisticated tools and technologies to gain access to other networks without being noticed by their Intrusion Detection Systems(IDSs). Moreover, these attacker have the necessary expertise to develop or modify the existing tools to satisfy their purpose. These types of attacks are usually performed by professional criminals, by a country on other rival countries, politicians to damage the image of the rival person or the country, terrorists, rival companies, etc.
  • 16. Reasons for Commission of Cyber Crimes There are many reasons which act as a catalyst in the growth of cyber crime. Some of the prominent reasons are: a. Money: People are motivated towards committing cyber crime is to make quick and easy money. b. Revenge: Some people try to take revenge with other person/organization/society/ caste or religion by defaming its reputation or bringing economical or physical loss. This comes under the category of cyber terrorism. c. Fun: The amateur do cyber crime for fun. They just want to test the latest tool they have encountered.
  • 17. d. Recognition: It is considered to be pride if someone hack the highly secured networks like defense sites or networks. e. Anonymity- Many time the anonymity that a cyberspace provide motivates the person to commit cyber crime as it is much easy to commit a cybercrime over the cyber space and remain anonymous as compared to real world. It is much easier to get away with criminal activity in a cyber world than in the real world. There is a strong sense of anonymity than can draw otherwise respectable citizens to abandon their ethics in pursuit personal gain.
  • 18. INDIAN IT ACT The Indian IT Act refers to the Information Technology Act, 2000, which is an important legislation in India that deals with electronic transactions, digital signatures, cybercrimes, and electronic governance. The act was enacted to provide a legal framework for facilitating electronic commerce, promoting the use of electronic records, and addressing issues related to cybersecurity and data protection.
  • 19. Here are some key features and provisions of the Indian IT Act: ● Digital Signatures: The IT Act recognizes digital signatures as legally valid and equivalent to physical signatures. It provides the legal framework for the use of digital signatures in electronic transactions. ● Electronic Governance: The act emphasizes the use of electronic means for government-related activities and services to ensure efficiency and transparency. ● Cybercrimes: The IT Act defines various cyber offenses and their corresponding penalties. It covers offenses such as unauthorized access to computer systems, data theft, hacking, and distribution of malicious software. ● Data Protection and Privacy: The act includes provisions for the protection of sensitive personal data and information. It establishes guidelines for handling and processing personal data and imposes penalties for violations.
  • 20. ● Intermediary Liability: The act addresses the liability of intermediaries (such as internet service providers and social media platforms) for content posted by users on their platforms. It provides certain safe harbor provisions to protect intermediaries from liability for user-generated content, subject to compliance with certain conditions. ● Computer-related Offenses: The act deals with offenses related to computer systems, including unauthorized access, hacking, and introducing viruses or malware. ● Cyber Appellate Tribunal: The act established the Cyber Appellate Tribunal to hear appeals against orders passed by adjudicating officers under the act. ● Adjudicating Officers and Authorities: The act designates certain officers and authorities to hear and decide on matters related to cyber offenses and data protection.
  • 21. Amendments to IT Act It's important to note that the Indian IT Act has been amended over the years to keep pace with technological advancements and changing cyber threats. Furthermore, India has introduced additional regulations related to data protection, including the Personal Data Protection Bill, 2019, which is currently under consideration by the Indian Parliament. This bill aims to provide a comprehensive framework for the protection of personal data and privacy in India.
  • 22. Amendments to IT Act the Indian Information Technology Act, 2000 (IT Act) has undergone several amendments over the years to address the changing landscape of technology and digital transactions. Some key amendments to the IT Act include: Information Technology (Amendment) Act, 2008: This amendment expanded the scope of the original IT Act to cover new technology developments. It introduced provisions related to data protection, security practices, penalties for cybercrimes, and the establishment of the Indian Computer Emergency Response Team (CERT-In).
  • 23. Amendments to IT Act ● Information Technology (Amendment) Act, 2009: This amendment further strengthened provisions related to cybersecurity, data protection, and the powers of law enforcement agencies to investigate and prevent cybercrimes. ● Information Technology (Amendment) Act, 2011: This amendment introduced changes to address issues related to electronic signatures, digital signatures, and the facilitation of electronic governance. ● Information Technology (Amendment) Act, 2018: This significant amendment introduced changes to the IT Act to align it with emerging technologies and digital initiatives. It included provisions related to electronic authentication, electronic evidence, and penalties for offenses such as cyberbullying and child pornography. ● Data Protection Bill (Proposed): While not an amendment to the IT Act itself, the proposed Data Protection Bill aims to establish comprehensive data protection and privacy regulations in India. Once enacted, this bill will work in conjunction with the IT Act to regulate the collection, processing, and use of personal data.
  • 25. cyber crimes mentioned in indian it act The Indian IT Act, 2000, defines several cybercrimes and prescribes penalties for them. Some of the cybercrimes mentioned in the act are as follows: ● Tampering with Computer Source Code (Section 65): This offense involves intentionally altering, damaging, deleting, or causing any harm to a computer source code. It carries a penalty of imprisonment up to three years or a fine up to two lakh rupees or both. ● Hacking (Section 66): Hacking refers to unauthorized access to a computer system or network. It includes introducing a virus, worm, or other malicious code to the system. The act prescribes imprisonment up to three years or a fine up to five lakh rupees or both for this offense. ● Data Theft (Section 66B): Data theft involves dishonestly receiving or retaining any stolen data, knowing or having reason to believe that it is stolen. It is punishable with imprisonment up to three years or a fine up to one lakh rupees or both. ● Identity Theft (Section 66C): Identity theft includes using someone else's identity for illegal purposes. It can lead to imprisonment up to three years or a fine up to one lakh rupees or both.
  • 26. ● Publishing or Transmitting Obscene Material (Section 67): This offense involves publishing or transmitting obscene material electronically. It carries a penalty of imprisonment up to three years or a fine up to five lakh rupees or both. ● Child Pornography (Section 67B): Producing, publishing, transmitting, or causing to be transmitted child pornography is an offense punishable with imprisonment up to seven years and a fine. ● Cyber Terrorism (Section 66F): Cyber terrorism involves acts that threaten the unity, integrity, security, or sovereignty of India or create a situation that leads to mass disruption of essential services using a computer resource. It carries a punishment of life imprisonment. ● Unauthorized Access to Computer Material (Section 43): Unauthorized access to computer material is a civil offense, and the act provides for compensation to the affected party. These are just a few examples of cyber crimes mentioned in the Indian IT Act. The act also includes provisions for other offenses related to breach of confidentiality, privacy, and other computer-related crimes. The penalties for these offenses vary depending on the severity of the crime and its impact on individuals, organizations, or the country as a whole.
  • 27. IT LAWS IN OTHER COUNTRIES various countries have enacted their own information technology laws to regulate electronic transactions, data protection, cybersecurity, and other technology-related matters. The names and details of these acts may have changed or evolved over time, so it's essential to verify the latest information from official government sources. Here is a list of some notable IT acts from different countries: ● United States: The United States has several laws related to information technology, including the Computer Fraud and Abuse Act (CFAA) and the Digital Millennium Copyright Act (DMCA). ● European Union: The General Data Protection Regulation (GDPR) is a significant data protection law that applies to all EU member states. ● India: The Information Technology Act, 2000, governs electronic transactions, cybersecurity, and data protection in India.
  • 28. ● United Kingdom: The Data Protection Act 2018 and the Computer Misuse Act 1990 are some of the key IT-related laws in the UK. ● Canada: Canada has the Personal Information Protection and Electronic Documents Act (PIPEDA) and the Canadian Anti-Spam Legislation (CASL). ● Australia: Australia has the Privacy Act 1988, which includes the Notifiable Data Breaches (NDB) scheme, and the Cybercrime Act 2001. ● Singapore: Singapore's Personal Data Protection Act (PDPA) and the Computer Misuse and Cybersecurity Act (CMCA) are the relevant IT laws. ● China: China has the Cybersecurity Law, which covers various aspects of cybersecurity, data protection, and internet governance. ● Japan: Japan's Act on the Protection of Personal Information (APPI) is the primary law for data protection. ● Brazil: Brazil has the Lei Geral de Proteção de Dados Pessoais (LGPD), which is a comprehensive data protection law. ● South Africa: The Protection of Personal Information Act (POPIA) is South Africa's data protection law. These are just a few examples, and many other countries have their own IT and data protection laws to regulate technology-related activities within their jurisdictions. It is essential to consult official government sources for the latest and most accurate information
  • 29. cyber crime has been largely reported in india several cyber crimes have been largely reported in India. Some of the prominent cybercrimes that have affected individuals, businesses, and organizations in India include: ● Phishing: Phishing attacks involve fraudulent attempts to trick individuals into revealing sensitive information, such as login credentials, credit card details, or personal information. Cybercriminals often use emails, websites, or messages that appear legitimate to deceive victims. ● Online Fraud: Online fraud encompasses various forms of scams, including lottery scams, job scams, investment scams, and fake shopping websites. These scams aim to steal money from unsuspecting victims by luring them into fraudulent transactions or investments.
  • 30. cyber crime has been largely reported in india ● Cyber Extortion: Cyber extortion involves threatening individuals or organizations with harm or damage unless a ransom is paid. Ransomware attacks, where attackers encrypt victims' data and demand a ransom for its release, are a common form of cyber extortion. ● Social Media Hacking: Cybercriminals may hack into social media accounts to gain unauthorized access, steal personal information, or spread false information. ● Data Breaches: Data breaches involve unauthorized access to sensitive information, such as personal data, financial records, or intellectual property. Breaches can occur due to security vulnerabilities in systems or through insider threats. ● Online Harassment and Cyberbullying: Harassment and cyberbullying occur when individuals use digital platforms to intimidate, threaten, or humiliate others. ● Identity Theft: Cybercriminals may steal personal information to impersonate individuals and commit financial fraud or other crimes. ● Cyber Attacks on Government and Private Organizations: Government websites and private organizations have been targeted by cyber attacks for various reasons, including hacking for political reasons, financial gain, or to cause disruption.
  • 31. Cybercrime trends can change over time as new technologies emerge and cybercriminals adapt their tactics. The Indian government and law enforcement agencies continuously work to combat cybercrimes and enhance cybersecurity measures to protect individuals and organizations from digital threats.
  • 32. References Nina Godbole, Sunit Belapure, Cyber Security, Wiley India, New Delhi