SlideShare a Scribd company logo
 What is Cyber Crime ?
 History of Cyber Crime.
 Types of Cyber Crime.
 Manner of Committing Cyber Crime.
 What is Cyber Law ?
Acts made to deal with cyber crime in
 India
 Case Study in India
2
 Cyber Crime is simply defined as crimes that are
directly related to computers and using
computers. It is any criminal act dealing with
computers and networks.
 An increasing number of criminal activities are
using the internet.
3
 Computers and other electronic devices can be tools
to commit crime. A personal computer connected to
Internet without protection may be infected with
malicious software in under a minute.
 Cybercrime is one of the fastest-growing criminal
activities on the planet, it covers huge range of
illegal activity including financial scams, computer
hacking and virus attacks.
4
 In early decades of modern IT, computer crimes
were committed by individual or dishonest
employees.
 As telecommunications technology spread
throughout the IT world, programmers started
writing malicious software, including self replicating
programs, to interface with personal computers.
 Popular cyber crimes are computer viruses and
phishing scams.
5
Target group of
computer devices
Target Personal
computer devices
Denial of Service
Malware
Computer Viruses
About
Person
About
Property
About
Gov.
Harassment
(sexual,
religious)
Transmission of
Harmful Programs
Cracking into
Gov.
maintained
Websites
6
 Unauthorized Access:
Unauthorized Access means any kind of access without
permission of either owner or rightful person as in-
charge of computer, computer system or computer
network.
 Hacking:
Every act committed towards breaking into computer or
network is Hacking. Hackers write or use ready made
computer programs to attack the large computer.
 Trojan Attack:
The program that acts like something useful but do
things that are quiet damping. The programs of this kind
are called Trojans.
7
 Virus and Worm Attack:
A program that has capability to infect other programs
and make copies of itself and spread into other
programs is called Virus.
And the programs multiply like viruses but spread
from computer to computer are called as worms.
 Phishing scams and fraud:
A phisher use spoof emails to direct computer user to
fraud websites to react or respond on a transfer of
money or credit cards details ,passwords from user.
 Email Spoofing:
It refers to email that appears to have been originated
from one source when it was actually send from
another source.
8
 Cyber Law is a term that
encapsulates the legal issues
related to use of Internet. It is less
a distinct field of law than
intellectual property or contract
law, as it is a domain covering
many areas of law and regulation.
Some leading topics include
access and usage.
9
 e-bay.in is the most popular online shopping
mall providing free online auctions for products
like mobiles/cell phones, cameras, computers,
etc.
 Two persons, alleged mastermind Debasis Pandit,
a B.Tech Student and other Rabi Narayan Sahu.
10
 Pandit allegedly hacked into eBay India site and
gathered the details of around 700 credit
cardholders. He then made purchases using their
passwords.
 The fraud came to the notice of eBay officials
when it was detected that several purchases were
made from Rourkela while the customers were
based in cities such as Bangalore, Baroda and
Jaipur.
11
 The company brought the matter to the notice of
Rourkela police after some customers lodged
complains.
 Pandit used to address of Sahu for the delivery of the
purchased goods and always be at sahu house.
 Bhubaneswar: Rourkela police busted a racket
involving in online fraud both of them got arrested.
12
 And this both were taken under remand and
forwarded to the court of sub divisional judicial
magistrate, Rourkela.
 The case has been registered against the accused
under sections 420 and 34 of the Indian Penal
Code and Section 66 on the IT Act and got eight
months jail with fine of six Lac.
13
 In 2013, the city police received almost 45
complaints of cyber crimes every month according to
TOI.
 India is the third most targeted country for phishing
attacks.
 India is the number one country in world for
generating the spam.
 In India 50% of cyber crime are not even reported.
14
15

More Related Content

What's hot

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
Sourav Kumar Mund
 
Cybercrime
CybercrimeCybercrime
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Priyankush salouria
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
Niloy Biswas
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rajendra Dangwal
 
Cyber crime
Cyber crimeCyber crime
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
Krishnakant Mishra
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 

What's hot (20)

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
Anushka Perera
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
Paras Kansagara
 
CFMA Cyber Crime Presentation
CFMA Cyber Crime PresentationCFMA Cyber Crime Presentation
CFMA Cyber Crime Presentation
Steve Machesney
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
Mohammed Mahfouz Alhassan
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
SajibeKanti
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
Asish Verma
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Tushar Malhotra
 
Models of democracy
Models of democracyModels of democracy
Models of democracy
Knight1040
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (16)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
CFMA Cyber Crime Presentation
CFMA Cyber Crime PresentationCFMA Cyber Crime Presentation
CFMA Cyber Crime Presentation
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Models of democracy
Models of democracyModels of democracy
Models of democracy
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Rajveer choudhary cyber crime presentation

Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
Jayati Tiwari
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
Presentation1
Presentation1Presentation1
Presentation1
Shivangi Sharma
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
ananthu07
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
OmprakashRaut
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
silas Sargunam
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
Vinay Pancholi
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
sunanditaAnand
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
VipinRawat52
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
aritraranjan
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
IJARIIT
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
Tushar Rajput
 

Similar to Rajveer choudhary cyber crime presentation (20)

Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Presentation1
Presentation1Presentation1
Presentation1
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
English in written
English in writtenEnglish in written
English in written
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 

Recently uploaded

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 

Recently uploaded (20)

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 

Rajveer choudhary cyber crime presentation

  • 1.
  • 2.  What is Cyber Crime ?  History of Cyber Crime.  Types of Cyber Crime.  Manner of Committing Cyber Crime.  What is Cyber Law ? Acts made to deal with cyber crime in  India  Case Study in India 2
  • 3.  Cyber Crime is simply defined as crimes that are directly related to computers and using computers. It is any criminal act dealing with computers and networks.  An increasing number of criminal activities are using the internet. 3
  • 4.  Computers and other electronic devices can be tools to commit crime. A personal computer connected to Internet without protection may be infected with malicious software in under a minute.  Cybercrime is one of the fastest-growing criminal activities on the planet, it covers huge range of illegal activity including financial scams, computer hacking and virus attacks. 4
  • 5.  In early decades of modern IT, computer crimes were committed by individual or dishonest employees.  As telecommunications technology spread throughout the IT world, programmers started writing malicious software, including self replicating programs, to interface with personal computers.  Popular cyber crimes are computer viruses and phishing scams. 5
  • 6. Target group of computer devices Target Personal computer devices Denial of Service Malware Computer Viruses About Person About Property About Gov. Harassment (sexual, religious) Transmission of Harmful Programs Cracking into Gov. maintained Websites 6
  • 7.  Unauthorized Access: Unauthorized Access means any kind of access without permission of either owner or rightful person as in- charge of computer, computer system or computer network.  Hacking: Every act committed towards breaking into computer or network is Hacking. Hackers write or use ready made computer programs to attack the large computer.  Trojan Attack: The program that acts like something useful but do things that are quiet damping. The programs of this kind are called Trojans. 7
  • 8.  Virus and Worm Attack: A program that has capability to infect other programs and make copies of itself and spread into other programs is called Virus. And the programs multiply like viruses but spread from computer to computer are called as worms.  Phishing scams and fraud: A phisher use spoof emails to direct computer user to fraud websites to react or respond on a transfer of money or credit cards details ,passwords from user.  Email Spoofing: It refers to email that appears to have been originated from one source when it was actually send from another source. 8
  • 9.  Cyber Law is a term that encapsulates the legal issues related to use of Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include access and usage. 9
  • 10.  e-bay.in is the most popular online shopping mall providing free online auctions for products like mobiles/cell phones, cameras, computers, etc.  Two persons, alleged mastermind Debasis Pandit, a B.Tech Student and other Rabi Narayan Sahu. 10
  • 11.  Pandit allegedly hacked into eBay India site and gathered the details of around 700 credit cardholders. He then made purchases using their passwords.  The fraud came to the notice of eBay officials when it was detected that several purchases were made from Rourkela while the customers were based in cities such as Bangalore, Baroda and Jaipur. 11
  • 12.  The company brought the matter to the notice of Rourkela police after some customers lodged complains.  Pandit used to address of Sahu for the delivery of the purchased goods and always be at sahu house.  Bhubaneswar: Rourkela police busted a racket involving in online fraud both of them got arrested. 12
  • 13.  And this both were taken under remand and forwarded to the court of sub divisional judicial magistrate, Rourkela.  The case has been registered against the accused under sections 420 and 34 of the Indian Penal Code and Section 66 on the IT Act and got eight months jail with fine of six Lac. 13
  • 14.  In 2013, the city police received almost 45 complaints of cyber crimes every month according to TOI.  India is the third most targeted country for phishing attacks.  India is the number one country in world for generating the spam.  In India 50% of cyber crime are not even reported. 14
  • 15. 15