SlideShare a Scribd company logo
PRESENTED BY :-
varun mathur
mba 1st
sem
Cyber crimes and privacyCyber crimes and privacy
issuesissues
AGENDA
• Introduction to cyber crime
• Modes and manner
• Categories
• How to protect
Cyber crime refers to any crime that involves
a computer and a network . The computer may
have been used in the commission of a crime, or
it may be the target .
Debarati Halder and Dr. K. Jaishankar defines
Cybercrimes as: "Offences that are committed
against individuals or groups of individuals with a
criminal motive to intentionally harm the
reputation of the victim or cause physical or
mental harm to the victim directly or indirectly,
using modern telecommunication networks such
as Internet and mobile phones .
Categorize of cyber crime
We can categorize cyber crime
in two ways.
1. The computer as a target- using a computer to attack
other computers via hacking, virus , dos attack .
2. The computer as a weapon – using a computer to commit
real world crimes . Ex- cyber terrorism , credit cards
frauds, pornography etc .
Cyber criminals:-
Children between age of 12- 19 years
Dissatisfied employees
Professional hackers & crackers
Organized hackers
Modes and manners
1. Unauthorized access to computer system
and network.
2.Theft of information stored in electronic
form
3.Hacking
4.Trojan attacks
5.Web jacking
6.e-mail bombing
Unauthorized access to computer system –
Unauthorized access to a computer system
entails approaching, trespassing within and
retrieving data or otherwise intercepting and
altering computer resources without consent. It
broadly falls into the term 'computer hacking',
because it attempts to bypass the security
mechanisms of a system.
Hacking
• Computer hacking is when someone modifies
computer hardware or software in a way that
alters the creator's original intent. People who
hack computers are known as hackers. Hackers
are usually real technology buffs who enjoy
learning all they can about computers and how
they work. Hackers think that what they do is like
an art form. They usually have expert-level skills
in one specific program. For most hackers,
hacking gives them the opportunity to use their
problem-solving skills and a chance to show off
their abilities. Most of them do not wish to harm
others.
Trojan attack
• A Trojan horse, or Trojan, is a hacking program
that is a non-self-replicating type of malware
which gains privileged access to the operating
system while appearing to perform a desirable
function but instead drops a malicious payload,
often including a backdoor allowing unauthorized
access to the target's computer.These
backdoors tend to be invisible to average users,
but may cause the computer to run slow.
Web jacking
• The web jacking attack vector is another
phishing technique that can be used in social
engineering engagements.
Attack followed in this attack are creating a fake
website and when the victim opens the link a
page will appear saying that the website has
been moved and they need to click another link.
If the victim clicks the link he will be redirected to
fake website.
E-mail bombing
• In internet usage, an email bomb is a
form of net abuse consisting of sending
huge volumes of email to an address in
an attempt to overflow the
mailbox or overwhelm the server where
the email address is hosted in a denial of
service attack .
Cyber attack can be on following
categories
• Cyber crime against person.
• Cyber crime against individual property.
• Cyber crime against government
Against person
• Harassment via e-mails
• Cyber stalking:-Stalking is a form of mental assault, in which
the perpetrator repeatedly, unwantedly, and disruptively breaks into the
life-world of the victim, with whom he has no relationship (or no longer
has), with motives that are directly or indirectly traceable to the affective
sphere. Moreover, the separated acts that make up the intrusion cannot
by themselves cause the mental abuse, but do taken together .
• E-mail spoofing:-Email spoofing is the creation
of email messages with a forged sender address - something which is
simple to do because the core protocols do
no authentiction. spam and phishing emails typically use such spoofing to
mislead the recipient about the origin of the message.
Against individual property
• Computer vandalism – it is a program that performs
malicious function such as extracting a user's password or other
data or erasing the hard disk. A vandal differs from a virus, which
attaches itself to an existing executable program. The vandal is
the full executing entity itself which can be downloaded from the
Internet in the form of an ActiveX control, Java applet, browser
plug-in or e-mail attachment.
• Transmitting virus - this means intentionally
transmission of viruses into other computer to destroy important
files and folders .
Against government
• Cyber terrorism is the use of internet based
attacks in terror activities, including acts of
deliberate, large-scale disruption of
computer networks, especially of personal
computers attached to the Internet, by the
means of tools such as viruses . Example –
attack on usa defence academy in iraq war ,
by iraqui hackers .
Types
• Child pornography
• Cyber contraband
• Cyber laundering
• Cyber stalking
• Cyber theft
India stands 10th in the cyber crime in the world
cyber privacy
Cyber privacy involves the right or mandate of
personal privacy concerning the storing, repurposing,
provision to third-parties, and displaying of information
pertaining to oneself via the internet .
How to protect ?
• Keep software up to date
• Use good passwords
• Disable remote connectivity
• Antivirus and anti spyware :- software-
antivirus software consists of computer
programme that attempt to identify thwart and
eliminate computer virus and other malicious
softwares . Anti spywares are used to restrict
backdoor programme , trojan and other
spywares to be installed on the computer .
• Firewalls :- a firewall protects a computer
network from unauthorized access. Network
firewalls may be hardware devices , software
programme , or a combination of the two .
Message
• Indian laws are well drafted and are capable
of handling all kinds of challenges as posed by
cyber criminals , however the enforcement
agencies are required to be well versed with
the changing technology and laws .
• As internet technology advances so does the
threat of cyber crime . In times like these we
must protect ourselves from cyber crime .
Antivirus software , firewalls and security
patches are just the beginning . Never open
suspicious e-mails and only navigate through
trusted sites .
Thank YouThank You

More Related Content

What's hot

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Jeet Swain
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mahabubur Rahman
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
Coder Tech
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
Prashant Sharma
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
PranavRaj96
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
dixitas
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
Adeel Rasheed
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
Ashish prashar
 

What's hot (20)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 

Viewers also liked

Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
FCA - Future Chartered Accountants
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (8)

Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to cyber crime and privacy issues by varun call for assistence 8003498888

Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
CYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptxCYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptx
IrfanaRahim2
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
Roshan Kumar Bhattarai
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Cyber security
Cyber securityCyber security
Cyber security
SaurabhKaushik57
 
Cyber crime
Cyber crimeCyber crime
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb21
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
karanjohar
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
Bobby Dait
 
Cyber crime
Cyber crimeCyber crime
Computer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxComputer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptx
SriArun9
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
jonadhe mondeja
 

Similar to cyber crime and privacy issues by varun call for assistence 8003498888 (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
CYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptxCYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptx
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxComputer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptx
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

cyber crime and privacy issues by varun call for assistence 8003498888

  • 1. PRESENTED BY :- varun mathur mba 1st sem
  • 2. Cyber crimes and privacyCyber crimes and privacy issuesissues
  • 3. AGENDA • Introduction to cyber crime • Modes and manner • Categories • How to protect
  • 4. Cyber crime refers to any crime that involves a computer and a network . The computer may have been used in the commission of a crime, or it may be the target . Debarati Halder and Dr. K. Jaishankar defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet and mobile phones .
  • 5. Categorize of cyber crime We can categorize cyber crime in two ways. 1. The computer as a target- using a computer to attack other computers via hacking, virus , dos attack . 2. The computer as a weapon – using a computer to commit real world crimes . Ex- cyber terrorism , credit cards frauds, pornography etc .
  • 6. Cyber criminals:- Children between age of 12- 19 years Dissatisfied employees Professional hackers & crackers Organized hackers
  • 7. Modes and manners 1. Unauthorized access to computer system and network. 2.Theft of information stored in electronic form 3.Hacking 4.Trojan attacks 5.Web jacking 6.e-mail bombing
  • 8. Unauthorized access to computer system – Unauthorized access to a computer system entails approaching, trespassing within and retrieving data or otherwise intercepting and altering computer resources without consent. It broadly falls into the term 'computer hacking', because it attempts to bypass the security mechanisms of a system.
  • 9. Hacking • Computer hacking is when someone modifies computer hardware or software in a way that alters the creator's original intent. People who hack computers are known as hackers. Hackers are usually real technology buffs who enjoy learning all they can about computers and how they work. Hackers think that what they do is like an art form. They usually have expert-level skills in one specific program. For most hackers, hacking gives them the opportunity to use their problem-solving skills and a chance to show off their abilities. Most of them do not wish to harm others.
  • 10. Trojan attack • A Trojan horse, or Trojan, is a hacking program that is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer.These backdoors tend to be invisible to average users, but may cause the computer to run slow.
  • 11. Web jacking • The web jacking attack vector is another phishing technique that can be used in social engineering engagements. Attack followed in this attack are creating a fake website and when the victim opens the link a page will appear saying that the website has been moved and they need to click another link. If the victim clicks the link he will be redirected to fake website.
  • 12. E-mail bombing • In internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial of service attack .
  • 13. Cyber attack can be on following categories • Cyber crime against person. • Cyber crime against individual property. • Cyber crime against government
  • 14. Against person • Harassment via e-mails • Cyber stalking:-Stalking is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together . • E-mail spoofing:-Email spoofing is the creation of email messages with a forged sender address - something which is simple to do because the core protocols do no authentiction. spam and phishing emails typically use such spoofing to mislead the recipient about the origin of the message.
  • 15. Against individual property • Computer vandalism – it is a program that performs malicious function such as extracting a user's password or other data or erasing the hard disk. A vandal differs from a virus, which attaches itself to an existing executable program. The vandal is the full executing entity itself which can be downloaded from the Internet in the form of an ActiveX control, Java applet, browser plug-in or e-mail attachment. • Transmitting virus - this means intentionally transmission of viruses into other computer to destroy important files and folders .
  • 16. Against government • Cyber terrorism is the use of internet based attacks in terror activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as viruses . Example – attack on usa defence academy in iraq war , by iraqui hackers .
  • 17. Types • Child pornography • Cyber contraband • Cyber laundering • Cyber stalking • Cyber theft
  • 18. India stands 10th in the cyber crime in the world
  • 19. cyber privacy Cyber privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third-parties, and displaying of information pertaining to oneself via the internet .
  • 20. How to protect ? • Keep software up to date • Use good passwords • Disable remote connectivity
  • 21. • Antivirus and anti spyware :- software- antivirus software consists of computer programme that attempt to identify thwart and eliminate computer virus and other malicious softwares . Anti spywares are used to restrict backdoor programme , trojan and other spywares to be installed on the computer . • Firewalls :- a firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices , software programme , or a combination of the two .
  • 22. Message • Indian laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals , however the enforcement agencies are required to be well versed with the changing technology and laws . • As internet technology advances so does the threat of cyber crime . In times like these we must protect ourselves from cyber crime . Antivirus software , firewalls and security patches are just the beginning . Never open suspicious e-mails and only navigate through trusted sites .