CONTENTS
1) INRODUCTION
2) HISTORY OF CYBER CRIME
3) TYPES OF CYBER CRIME
4) CYBER CRIMES IN INDIA
5) HOW TO PREVENT CYBER CRIME
6) CONCLUSION
INTRODUCTION
WHAT IS CYBER CRIME?
CYBER CRIME REFERS TO ANY ILLEGAL
ACTION THAT INVOLVES A NETWORK OR
COMPUTER. IN ANY SENSE, THE NETWORK
OR COMPUTER MAY HAVE BEEN USED TO
COMMIT A CRIME OR MAY BE THE TARGET
OF A CRIME. CYBER CRIMES ARE ANY
CRIMES THAT INVOLVE A COMPUTER AND
A NETWORK. CYBERCRIME MAY
THREATEN A PERSON OR NATION’S
SECURITY AND FINANCIAL HEALTH.
HISTORY
CYBERCRIME FIRST STARTED WITH
HACKERS TRYING TO BREAK INTO
COMPUTER NETWORKS. SOME DID IT JUST
FOR THE THRILL OF ACCESSING HIGH-
LEVEL SECURITY NETWORKS, BUT
OTHERS SOUGHT TO GAIN SENSITIVE,
CLASSIFIED MATERIAL. EVENTUALLY,
CRIMINALS STARTED TO INFECT
COMPUTER SYSTEMS WITH COMPUTER
VIRUSES, WHICH LED TO BREAKDOWNS
ON PERSONALAND BUSINESS
COMPUTERS.
TYPES OF CYBER CRIMES
HACKING
IIDENTITY
THEFT
VIRUS
DISSEMINATION
PIRACY
CYBER
STALKING
SPAMING &
PHISHING
HACKING
HACKING IS THE ACT OF GAINING ACCESS
WITHOUT LEGAL AUTHORIZATION TO A
COMPUTER OR COMPUTER NETWORK. THE
PERSON ENGAGED IN HACKING ACTIVITIES IS
KNOWN AS HACKER. HACKERS ARE USUALLY
SKILLED COMPUTER PROGRAMMERS WITH
KNOWLEDGE OF COMPUTER SECURITY.
SPAMMING IS THE USE OF
ELECTRONIC MESSAGING
SYSTEMS TO SEND AN
UNSOLICITED MESSAGE
(SPAM). A PERSON WHO
CREATES ELECTRONIC SPAM
IS CALLED SPAMMER.
PHISHING IS A METHOD
WHERE CYBER CRIMINALS
BAIT YOU INTO DISCLOSING
THE INFORMATION THEY
WANT
SPAMING & PHISHING
CYBERSTALKING
CYBERSTALKING REFERS TO THE CRIME OF USING
THE INTERNET, EMAIL OR OTHER SOCIAL MEDIA
PLATFORM TO STALK, HARASS OR THREATEN
ANOTHER PERSON. CYBERSTALKING MOST OFTEN
INVOLVES SENDING HARRASING EMAILS, INSTANT
OR TEXT MESSAGES, OR SOCIAL MEDIA POSTS, OR
CREATING WEBSITES FOR THE SOLE PURPOSE OF
TORMENTING THE VICTIM
$%&”@!$%&”@!$%&”@! LOSER!
STUPID!
SOFTWARE PIRACY
SOFTWARE PIRACY IS THE
ILLEGAL COPYING, DISTRIBUTION,
OR USE OF SOFTWARE. SOFTWARE
PIRACY IS THE STEALING OF
LEGALLY PROTECTED SOFTWARE.
UNDER COPYRIGHT LAW,
SOFTWARE PIRACYB OCCURS
WHEN COPYRIGHT PROTECTED
SOFTWARE IS COPIED,
DISTRIBUTED, MODIFIED OR SOLD.
ACCORDING TO THE BUSINESS
SOFTEWARE ALLIANCE(BSA),
ABOUT 36% OF ALL SOFTWARE IN
CURRENT USE IS STOLEN.
BVIRUS DISSEMINATION
Virus Dissemination is a
process of a Malicious
software that attaches itself
to other software. Virus,
worms, Trojan Horse, Time
bomb, Logic Bomb, Rabbit
and Bacterium are examples
of malicious software that
destroys the system of the
victim.
IDENTITY THEFT
IDENTITY THEFT IS THE CRIME OF
OBTAINING THE PERSONAL OR
FINANCIAL INFORMATION OF
ANOTHER PERSON FOR THE SOLE
PURPOSE OF ASSUMING THAT
PERSON’S NAME OR IDENTIY TO
MAKE TRANSACTIONS OR
PURCHASES. IDENTITY THEFT
OCCURS WHEN SOMEONE USES
ANOTHER’S PERSONALLY
IDENTIFYING INFORMATION, LIKE
THEIR NAME, NUMBER, CRDIT
CARD NUMBER, WITHOUT THEIR
PERMISSION.
CYBER CRIMES IN INDIA
CYBER CRIME IN INDIA HAS BEEN EVOLVING
RAPIDLY. THE INFORMATION ACT, 2000 PASSED
BY THE PARLIAMENT OF INDIA IN MAY 2000, HAD
AIMED TO CURB CYBER CRIMES AND TO
PROVIDE LEGAL FRAMEWORK FOR E-
COMMERCE TRANSACTIONS. IN 2001 INDIAAND
USA HAD SET UP AN INDIA-USA CYVER
SECURITY FORUM AS PART OF A COUNTER-
TERRORISM DIALOGUE. CYBERCRIME CASES IN
INDIA, REGISTERED UNDER THE IT ACT,
INCREASED AT A RATE OF 300% BETWEEN 2011 &
2014. IN 2015, THERE WERE 11,592 CASES OF
CYBER CRIME REGISTERED IN INDIA.
HOW TO PREVENT CYBER CRIME
AWARENESS IS THE FIRST STEP IN PROTECTING
YOURSELF, YOUR FAMILY AND YOUR BUSINESS.
NEVER GIVE YOUR FULL NAME OR ADDRESS TO
STRANGERS.
NEVER ENTER YOUR CRDIT CARD NUMBER TO
ANY SITE THAT IS NOT SECURE.
MANAGE YOUR SOCIAL MEDIA SETTINGS TO
KEEP MOST OF YOUR PERSONAL AND PRIVATE
INFO LOCKED DOWN
SECURE YOUR HOME NETWORK WITH STRONG
ENCRYPTION PASSWORD AS WELL AS A VPN
REVIEW FINANCIAL STATEMENTS REGULARLY
DON’T OPEN EMAILS AND ATTACHMENTS
FROM UNKNOWN SOURCES
LEARN MORE ABOUT INTERNET PRIVACY
UNINSTALL UNNECESSARY SOFTWARE
USE HARD-TO-GUESS PASSWORDS.
KEEP YOUR OPERATING SYSTEM UP TO DATE
WITH CRITICAL SECURITY AND UPDATES &
PATHCHES
USE ANTIVIRUS SOFTWARE & FIREWALLS KEEP
THEM UP TO DATE
MAINTAIN BACKUP.
CHECK SECURITY SETTINGS.
CONCLUSION
THE KEY TO PROTECTING YOURSELF IS BEING
AWARE.
TECHNOLOGY IS DESTRUCTIVE ONLY IN THE
HANDS OF PEOPLE WHO DO NOT REALIZE THAT
THEY ARE ONE AND THE SAME PROCESS AS
THE UNIVERSE.
AS INTERNET CONTINUES TO DEVELOP THE
POTENTIAL FOR COMPUTER RELATED CRIME
WILL GROW
CYBER CRIME GREATLE AFFECTS INDIVIDUALS,
BUSINESSES, AND NATINAL SECURITY DUE TO
PERVASIVENESS OF THE INTERNET.
CYBERCRIME IS A MAJOR PROBLEM – AND
GROWING .STAY SECURE, STAY SAFE

Presentation on cyber crime

  • 2.
    CONTENTS 1) INRODUCTION 2) HISTORYOF CYBER CRIME 3) TYPES OF CYBER CRIME 4) CYBER CRIMES IN INDIA 5) HOW TO PREVENT CYBER CRIME 6) CONCLUSION
  • 3.
    INTRODUCTION WHAT IS CYBERCRIME? CYBER CRIME REFERS TO ANY ILLEGAL ACTION THAT INVOLVES A NETWORK OR COMPUTER. IN ANY SENSE, THE NETWORK OR COMPUTER MAY HAVE BEEN USED TO COMMIT A CRIME OR MAY BE THE TARGET OF A CRIME. CYBER CRIMES ARE ANY CRIMES THAT INVOLVE A COMPUTER AND A NETWORK. CYBERCRIME MAY THREATEN A PERSON OR NATION’S SECURITY AND FINANCIAL HEALTH.
  • 4.
    HISTORY CYBERCRIME FIRST STARTEDWITH HACKERS TRYING TO BREAK INTO COMPUTER NETWORKS. SOME DID IT JUST FOR THE THRILL OF ACCESSING HIGH- LEVEL SECURITY NETWORKS, BUT OTHERS SOUGHT TO GAIN SENSITIVE, CLASSIFIED MATERIAL. EVENTUALLY, CRIMINALS STARTED TO INFECT COMPUTER SYSTEMS WITH COMPUTER VIRUSES, WHICH LED TO BREAKDOWNS ON PERSONALAND BUSINESS COMPUTERS.
  • 5.
    TYPES OF CYBERCRIMES HACKING IIDENTITY THEFT VIRUS DISSEMINATION PIRACY CYBER STALKING SPAMING & PHISHING
  • 6.
    HACKING HACKING IS THEACT OF GAINING ACCESS WITHOUT LEGAL AUTHORIZATION TO A COMPUTER OR COMPUTER NETWORK. THE PERSON ENGAGED IN HACKING ACTIVITIES IS KNOWN AS HACKER. HACKERS ARE USUALLY SKILLED COMPUTER PROGRAMMERS WITH KNOWLEDGE OF COMPUTER SECURITY.
  • 7.
    SPAMMING IS THEUSE OF ELECTRONIC MESSAGING SYSTEMS TO SEND AN UNSOLICITED MESSAGE (SPAM). A PERSON WHO CREATES ELECTRONIC SPAM IS CALLED SPAMMER. PHISHING IS A METHOD WHERE CYBER CRIMINALS BAIT YOU INTO DISCLOSING THE INFORMATION THEY WANT SPAMING & PHISHING
  • 8.
    CYBERSTALKING CYBERSTALKING REFERS TOTHE CRIME OF USING THE INTERNET, EMAIL OR OTHER SOCIAL MEDIA PLATFORM TO STALK, HARASS OR THREATEN ANOTHER PERSON. CYBERSTALKING MOST OFTEN INVOLVES SENDING HARRASING EMAILS, INSTANT OR TEXT MESSAGES, OR SOCIAL MEDIA POSTS, OR CREATING WEBSITES FOR THE SOLE PURPOSE OF TORMENTING THE VICTIM $%&”@!$%&”@!$%&”@! LOSER! STUPID!
  • 9.
    SOFTWARE PIRACY SOFTWARE PIRACYIS THE ILLEGAL COPYING, DISTRIBUTION, OR USE OF SOFTWARE. SOFTWARE PIRACY IS THE STEALING OF LEGALLY PROTECTED SOFTWARE. UNDER COPYRIGHT LAW, SOFTWARE PIRACYB OCCURS WHEN COPYRIGHT PROTECTED SOFTWARE IS COPIED, DISTRIBUTED, MODIFIED OR SOLD. ACCORDING TO THE BUSINESS SOFTEWARE ALLIANCE(BSA), ABOUT 36% OF ALL SOFTWARE IN CURRENT USE IS STOLEN.
  • 10.
    BVIRUS DISSEMINATION Virus Disseminationis a process of a Malicious software that attaches itself to other software. Virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are examples of malicious software that destroys the system of the victim.
  • 11.
    IDENTITY THEFT IDENTITY THEFTIS THE CRIME OF OBTAINING THE PERSONAL OR FINANCIAL INFORMATION OF ANOTHER PERSON FOR THE SOLE PURPOSE OF ASSUMING THAT PERSON’S NAME OR IDENTIY TO MAKE TRANSACTIONS OR PURCHASES. IDENTITY THEFT OCCURS WHEN SOMEONE USES ANOTHER’S PERSONALLY IDENTIFYING INFORMATION, LIKE THEIR NAME, NUMBER, CRDIT CARD NUMBER, WITHOUT THEIR PERMISSION.
  • 12.
    CYBER CRIMES ININDIA CYBER CRIME IN INDIA HAS BEEN EVOLVING RAPIDLY. THE INFORMATION ACT, 2000 PASSED BY THE PARLIAMENT OF INDIA IN MAY 2000, HAD AIMED TO CURB CYBER CRIMES AND TO PROVIDE LEGAL FRAMEWORK FOR E- COMMERCE TRANSACTIONS. IN 2001 INDIAAND USA HAD SET UP AN INDIA-USA CYVER SECURITY FORUM AS PART OF A COUNTER- TERRORISM DIALOGUE. CYBERCRIME CASES IN INDIA, REGISTERED UNDER THE IT ACT, INCREASED AT A RATE OF 300% BETWEEN 2011 & 2014. IN 2015, THERE WERE 11,592 CASES OF CYBER CRIME REGISTERED IN INDIA.
  • 13.
    HOW TO PREVENTCYBER CRIME AWARENESS IS THE FIRST STEP IN PROTECTING YOURSELF, YOUR FAMILY AND YOUR BUSINESS. NEVER GIVE YOUR FULL NAME OR ADDRESS TO STRANGERS. NEVER ENTER YOUR CRDIT CARD NUMBER TO ANY SITE THAT IS NOT SECURE. MANAGE YOUR SOCIAL MEDIA SETTINGS TO KEEP MOST OF YOUR PERSONAL AND PRIVATE INFO LOCKED DOWN SECURE YOUR HOME NETWORK WITH STRONG ENCRYPTION PASSWORD AS WELL AS A VPN
  • 14.
    REVIEW FINANCIAL STATEMENTSREGULARLY DON’T OPEN EMAILS AND ATTACHMENTS FROM UNKNOWN SOURCES LEARN MORE ABOUT INTERNET PRIVACY UNINSTALL UNNECESSARY SOFTWARE USE HARD-TO-GUESS PASSWORDS. KEEP YOUR OPERATING SYSTEM UP TO DATE WITH CRITICAL SECURITY AND UPDATES & PATHCHES USE ANTIVIRUS SOFTWARE & FIREWALLS KEEP THEM UP TO DATE MAINTAIN BACKUP. CHECK SECURITY SETTINGS.
  • 15.
    CONCLUSION THE KEY TOPROTECTING YOURSELF IS BEING AWARE. TECHNOLOGY IS DESTRUCTIVE ONLY IN THE HANDS OF PEOPLE WHO DO NOT REALIZE THAT THEY ARE ONE AND THE SAME PROCESS AS THE UNIVERSE. AS INTERNET CONTINUES TO DEVELOP THE POTENTIAL FOR COMPUTER RELATED CRIME WILL GROW CYBER CRIME GREATLE AFFECTS INDIVIDUALS, BUSINESSES, AND NATINAL SECURITY DUE TO PERVASIVENESS OF THE INTERNET. CYBERCRIME IS A MAJOR PROBLEM – AND GROWING .STAY SECURE, STAY SAFE