SlideShare a Scribd company logo
1 of 15
CONTENTS
1) INRODUCTION
2) HISTORY OF CYBER CRIME
3) TYPES OF CYBER CRIME
4) CYBER CRIMES IN INDIA
5) HOW TO PREVENT CYBER CRIME
6) CONCLUSION
INTRODUCTION
WHAT IS CYBER CRIME?
CYBER CRIME REFERS TO ANY ILLEGAL
ACTION THAT INVOLVES A NETWORK OR
COMPUTER. IN ANY SENSE, THE NETWORK
OR COMPUTER MAY HAVE BEEN USED TO
COMMIT A CRIME OR MAY BE THE TARGET
OF A CRIME. CYBER CRIMES ARE ANY
CRIMES THAT INVOLVE A COMPUTER AND
A NETWORK. CYBERCRIME MAY
THREATEN A PERSON OR NATION’S
SECURITY AND FINANCIAL HEALTH.
HISTORY
CYBERCRIME FIRST STARTED WITH
HACKERS TRYING TO BREAK INTO
COMPUTER NETWORKS. SOME DID IT JUST
FOR THE THRILL OF ACCESSING HIGH-
LEVEL SECURITY NETWORKS, BUT
OTHERS SOUGHT TO GAIN SENSITIVE,
CLASSIFIED MATERIAL. EVENTUALLY,
CRIMINALS STARTED TO INFECT
COMPUTER SYSTEMS WITH COMPUTER
VIRUSES, WHICH LED TO BREAKDOWNS
ON PERSONALAND BUSINESS
COMPUTERS.
TYPES OF CYBER CRIMES
HACKING
IIDENTITY
THEFT
VIRUS
DISSEMINATION
PIRACY
CYBER
STALKING
SPAMING &
PHISHING
HACKING
HACKING IS THE ACT OF GAINING ACCESS
WITHOUT LEGAL AUTHORIZATION TO A
COMPUTER OR COMPUTER NETWORK. THE
PERSON ENGAGED IN HACKING ACTIVITIES IS
KNOWN AS HACKER. HACKERS ARE USUALLY
SKILLED COMPUTER PROGRAMMERS WITH
KNOWLEDGE OF COMPUTER SECURITY.
SPAMMING IS THE USE OF
ELECTRONIC MESSAGING
SYSTEMS TO SEND AN
UNSOLICITED MESSAGE
(SPAM). A PERSON WHO
CREATES ELECTRONIC SPAM
IS CALLED SPAMMER.
PHISHING IS A METHOD
WHERE CYBER CRIMINALS
BAIT YOU INTO DISCLOSING
THE INFORMATION THEY
WANT
SPAMING & PHISHING
CYBERSTALKING
CYBERSTALKING REFERS TO THE CRIME OF USING
THE INTERNET, EMAIL OR OTHER SOCIAL MEDIA
PLATFORM TO STALK, HARASS OR THREATEN
ANOTHER PERSON. CYBERSTALKING MOST OFTEN
INVOLVES SENDING HARRASING EMAILS, INSTANT
OR TEXT MESSAGES, OR SOCIAL MEDIA POSTS, OR
CREATING WEBSITES FOR THE SOLE PURPOSE OF
TORMENTING THE VICTIM
$%&”@!$%&”@!$%&”@! LOSER!
STUPID!
SOFTWARE PIRACY
SOFTWARE PIRACY IS THE
ILLEGAL COPYING, DISTRIBUTION,
OR USE OF SOFTWARE. SOFTWARE
PIRACY IS THE STEALING OF
LEGALLY PROTECTED SOFTWARE.
UNDER COPYRIGHT LAW,
SOFTWARE PIRACYB OCCURS
WHEN COPYRIGHT PROTECTED
SOFTWARE IS COPIED,
DISTRIBUTED, MODIFIED OR SOLD.
ACCORDING TO THE BUSINESS
SOFTEWARE ALLIANCE(BSA),
ABOUT 36% OF ALL SOFTWARE IN
CURRENT USE IS STOLEN.
BVIRUS DISSEMINATION
Virus Dissemination is a
process of a Malicious
software that attaches itself
to other software. Virus,
worms, Trojan Horse, Time
bomb, Logic Bomb, Rabbit
and Bacterium are examples
of malicious software that
destroys the system of the
victim.
IDENTITY THEFT
IDENTITY THEFT IS THE CRIME OF
OBTAINING THE PERSONAL OR
FINANCIAL INFORMATION OF
ANOTHER PERSON FOR THE SOLE
PURPOSE OF ASSUMING THAT
PERSON’S NAME OR IDENTIY TO
MAKE TRANSACTIONS OR
PURCHASES. IDENTITY THEFT
OCCURS WHEN SOMEONE USES
ANOTHER’S PERSONALLY
IDENTIFYING INFORMATION, LIKE
THEIR NAME, NUMBER, CRDIT
CARD NUMBER, WITHOUT THEIR
PERMISSION.
CYBER CRIMES IN INDIA
CYBER CRIME IN INDIA HAS BEEN EVOLVING
RAPIDLY. THE INFORMATION ACT, 2000 PASSED
BY THE PARLIAMENT OF INDIA IN MAY 2000, HAD
AIMED TO CURB CYBER CRIMES AND TO
PROVIDE LEGAL FRAMEWORK FOR E-
COMMERCE TRANSACTIONS. IN 2001 INDIAAND
USA HAD SET UP AN INDIA-USA CYVER
SECURITY FORUM AS PART OF A COUNTER-
TERRORISM DIALOGUE. CYBERCRIME CASES IN
INDIA, REGISTERED UNDER THE IT ACT,
INCREASED AT A RATE OF 300% BETWEEN 2011 &
2014. IN 2015, THERE WERE 11,592 CASES OF
CYBER CRIME REGISTERED IN INDIA.
HOW TO PREVENT CYBER CRIME
AWARENESS IS THE FIRST STEP IN PROTECTING
YOURSELF, YOUR FAMILY AND YOUR BUSINESS.
NEVER GIVE YOUR FULL NAME OR ADDRESS TO
STRANGERS.
NEVER ENTER YOUR CRDIT CARD NUMBER TO
ANY SITE THAT IS NOT SECURE.
MANAGE YOUR SOCIAL MEDIA SETTINGS TO
KEEP MOST OF YOUR PERSONAL AND PRIVATE
INFO LOCKED DOWN
SECURE YOUR HOME NETWORK WITH STRONG
ENCRYPTION PASSWORD AS WELL AS A VPN
REVIEW FINANCIAL STATEMENTS REGULARLY
DON’T OPEN EMAILS AND ATTACHMENTS
FROM UNKNOWN SOURCES
LEARN MORE ABOUT INTERNET PRIVACY
UNINSTALL UNNECESSARY SOFTWARE
USE HARD-TO-GUESS PASSWORDS.
KEEP YOUR OPERATING SYSTEM UP TO DATE
WITH CRITICAL SECURITY AND UPDATES &
PATHCHES
USE ANTIVIRUS SOFTWARE & FIREWALLS KEEP
THEM UP TO DATE
MAINTAIN BACKUP.
CHECK SECURITY SETTINGS.
CONCLUSION
THE KEY TO PROTECTING YOURSELF IS BEING
AWARE.
TECHNOLOGY IS DESTRUCTIVE ONLY IN THE
HANDS OF PEOPLE WHO DO NOT REALIZE THAT
THEY ARE ONE AND THE SAME PROCESS AS
THE UNIVERSE.
AS INTERNET CONTINUES TO DEVELOP THE
POTENTIAL FOR COMPUTER RELATED CRIME
WILL GROW
CYBER CRIME GREATLE AFFECTS INDIVIDUALS,
BUSINESSES, AND NATINAL SECURITY DUE TO
PERVASIVENESS OF THE INTERNET.
CYBERCRIME IS A MAJOR PROBLEM – AND
GROWING .STAY SECURE, STAY SAFE

More Related Content

What's hot

What's hot (20)

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 

Similar to Understanding Cyber Crime: Types, Prevention and the Indian Scenario

Business law assignment
Business law assignmentBusiness law assignment
Business law assignmentSriAthi
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfKira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02raja jawahar
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against propertyvarunbamba
 

Similar to Understanding Cyber Crime: Types, Prevention and the Indian Scenario (20)

Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Business law assignment
Business law assignmentBusiness law assignment
Business law assignment
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

Understanding Cyber Crime: Types, Prevention and the Indian Scenario

  • 1.
  • 2. CONTENTS 1) INRODUCTION 2) HISTORY OF CYBER CRIME 3) TYPES OF CYBER CRIME 4) CYBER CRIMES IN INDIA 5) HOW TO PREVENT CYBER CRIME 6) CONCLUSION
  • 3. INTRODUCTION WHAT IS CYBER CRIME? CYBER CRIME REFERS TO ANY ILLEGAL ACTION THAT INVOLVES A NETWORK OR COMPUTER. IN ANY SENSE, THE NETWORK OR COMPUTER MAY HAVE BEEN USED TO COMMIT A CRIME OR MAY BE THE TARGET OF A CRIME. CYBER CRIMES ARE ANY CRIMES THAT INVOLVE A COMPUTER AND A NETWORK. CYBERCRIME MAY THREATEN A PERSON OR NATION’S SECURITY AND FINANCIAL HEALTH.
  • 4. HISTORY CYBERCRIME FIRST STARTED WITH HACKERS TRYING TO BREAK INTO COMPUTER NETWORKS. SOME DID IT JUST FOR THE THRILL OF ACCESSING HIGH- LEVEL SECURITY NETWORKS, BUT OTHERS SOUGHT TO GAIN SENSITIVE, CLASSIFIED MATERIAL. EVENTUALLY, CRIMINALS STARTED TO INFECT COMPUTER SYSTEMS WITH COMPUTER VIRUSES, WHICH LED TO BREAKDOWNS ON PERSONALAND BUSINESS COMPUTERS.
  • 5. TYPES OF CYBER CRIMES HACKING IIDENTITY THEFT VIRUS DISSEMINATION PIRACY CYBER STALKING SPAMING & PHISHING
  • 6. HACKING HACKING IS THE ACT OF GAINING ACCESS WITHOUT LEGAL AUTHORIZATION TO A COMPUTER OR COMPUTER NETWORK. THE PERSON ENGAGED IN HACKING ACTIVITIES IS KNOWN AS HACKER. HACKERS ARE USUALLY SKILLED COMPUTER PROGRAMMERS WITH KNOWLEDGE OF COMPUTER SECURITY.
  • 7. SPAMMING IS THE USE OF ELECTRONIC MESSAGING SYSTEMS TO SEND AN UNSOLICITED MESSAGE (SPAM). A PERSON WHO CREATES ELECTRONIC SPAM IS CALLED SPAMMER. PHISHING IS A METHOD WHERE CYBER CRIMINALS BAIT YOU INTO DISCLOSING THE INFORMATION THEY WANT SPAMING & PHISHING
  • 8. CYBERSTALKING CYBERSTALKING REFERS TO THE CRIME OF USING THE INTERNET, EMAIL OR OTHER SOCIAL MEDIA PLATFORM TO STALK, HARASS OR THREATEN ANOTHER PERSON. CYBERSTALKING MOST OFTEN INVOLVES SENDING HARRASING EMAILS, INSTANT OR TEXT MESSAGES, OR SOCIAL MEDIA POSTS, OR CREATING WEBSITES FOR THE SOLE PURPOSE OF TORMENTING THE VICTIM $%&”@!$%&”@!$%&”@! LOSER! STUPID!
  • 9. SOFTWARE PIRACY SOFTWARE PIRACY IS THE ILLEGAL COPYING, DISTRIBUTION, OR USE OF SOFTWARE. SOFTWARE PIRACY IS THE STEALING OF LEGALLY PROTECTED SOFTWARE. UNDER COPYRIGHT LAW, SOFTWARE PIRACYB OCCURS WHEN COPYRIGHT PROTECTED SOFTWARE IS COPIED, DISTRIBUTED, MODIFIED OR SOLD. ACCORDING TO THE BUSINESS SOFTEWARE ALLIANCE(BSA), ABOUT 36% OF ALL SOFTWARE IN CURRENT USE IS STOLEN.
  • 10. BVIRUS DISSEMINATION Virus Dissemination is a process of a Malicious software that attaches itself to other software. Virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are examples of malicious software that destroys the system of the victim.
  • 11. IDENTITY THEFT IDENTITY THEFT IS THE CRIME OF OBTAINING THE PERSONAL OR FINANCIAL INFORMATION OF ANOTHER PERSON FOR THE SOLE PURPOSE OF ASSUMING THAT PERSON’S NAME OR IDENTIY TO MAKE TRANSACTIONS OR PURCHASES. IDENTITY THEFT OCCURS WHEN SOMEONE USES ANOTHER’S PERSONALLY IDENTIFYING INFORMATION, LIKE THEIR NAME, NUMBER, CRDIT CARD NUMBER, WITHOUT THEIR PERMISSION.
  • 12. CYBER CRIMES IN INDIA CYBER CRIME IN INDIA HAS BEEN EVOLVING RAPIDLY. THE INFORMATION ACT, 2000 PASSED BY THE PARLIAMENT OF INDIA IN MAY 2000, HAD AIMED TO CURB CYBER CRIMES AND TO PROVIDE LEGAL FRAMEWORK FOR E- COMMERCE TRANSACTIONS. IN 2001 INDIAAND USA HAD SET UP AN INDIA-USA CYVER SECURITY FORUM AS PART OF A COUNTER- TERRORISM DIALOGUE. CYBERCRIME CASES IN INDIA, REGISTERED UNDER THE IT ACT, INCREASED AT A RATE OF 300% BETWEEN 2011 & 2014. IN 2015, THERE WERE 11,592 CASES OF CYBER CRIME REGISTERED IN INDIA.
  • 13. HOW TO PREVENT CYBER CRIME AWARENESS IS THE FIRST STEP IN PROTECTING YOURSELF, YOUR FAMILY AND YOUR BUSINESS. NEVER GIVE YOUR FULL NAME OR ADDRESS TO STRANGERS. NEVER ENTER YOUR CRDIT CARD NUMBER TO ANY SITE THAT IS NOT SECURE. MANAGE YOUR SOCIAL MEDIA SETTINGS TO KEEP MOST OF YOUR PERSONAL AND PRIVATE INFO LOCKED DOWN SECURE YOUR HOME NETWORK WITH STRONG ENCRYPTION PASSWORD AS WELL AS A VPN
  • 14. REVIEW FINANCIAL STATEMENTS REGULARLY DON’T OPEN EMAILS AND ATTACHMENTS FROM UNKNOWN SOURCES LEARN MORE ABOUT INTERNET PRIVACY UNINSTALL UNNECESSARY SOFTWARE USE HARD-TO-GUESS PASSWORDS. KEEP YOUR OPERATING SYSTEM UP TO DATE WITH CRITICAL SECURITY AND UPDATES & PATHCHES USE ANTIVIRUS SOFTWARE & FIREWALLS KEEP THEM UP TO DATE MAINTAIN BACKUP. CHECK SECURITY SETTINGS.
  • 15. CONCLUSION THE KEY TO PROTECTING YOURSELF IS BEING AWARE. TECHNOLOGY IS DESTRUCTIVE ONLY IN THE HANDS OF PEOPLE WHO DO NOT REALIZE THAT THEY ARE ONE AND THE SAME PROCESS AS THE UNIVERSE. AS INTERNET CONTINUES TO DEVELOP THE POTENTIAL FOR COMPUTER RELATED CRIME WILL GROW CYBER CRIME GREATLE AFFECTS INDIVIDUALS, BUSINESSES, AND NATINAL SECURITY DUE TO PERVASIVENESS OF THE INTERNET. CYBERCRIME IS A MAJOR PROBLEM – AND GROWING .STAY SECURE, STAY SAFE