SlideShare a Scribd company logo
1 of 15
CONTENTS
1) INRODUCTION
2) HISTORY OF CYBER CRIME
3) TYPES OF CYBER CRIME
4) CYBER CRIMES IN INDIA
5) HOW TO PREVENT CYBER CRIME
6) CONCLUSION
INTRODUCTION
WHAT IS CYBER CRIME?
CYBER CRIME REFERS TO ANY ILLEGAL
ACTION THAT INVOLVES A NETWORK OR
COMPUTER. IN ANY SENSE, THE NETWORK
OR COMPUTER MAY HAVE BEEN USED TO
COMMIT A CRIME OR MAY BE THE TARGET
OF A CRIME. CYBER CRIMES ARE ANY
CRIMES THAT INVOLVE A COMPUTER AND
A NETWORK. CYBERCRIME MAY
THREATEN A PERSON OR NATION’S
SECURITY AND FINANCIAL HEALTH.
HISTORY
CYBERCRIME FIRST STARTED WITH
HACKERS TRYING TO BREAK INTO
COMPUTER NETWORKS. SOME DID IT JUST
FOR THE THRILL OF ACCESSING HIGH-
LEVEL SECURITY NETWORKS, BUT
OTHERS SOUGHT TO GAIN SENSITIVE,
CLASSIFIED MATERIAL. EVENTUALLY,
CRIMINALS STARTED TO INFECT
COMPUTER SYSTEMS WITH COMPUTER
VIRUSES, WHICH LED TO BREAKDOWNS
ON PERSONALAND BUSINESS
COMPUTERS.
TYPES OF CYBER CRIMES
HACKING
IIDENTITY
THEFT
VIRUS
DISSEMINATION
PIRACY
CYBER
STALKING
SPAMING &
PHISHING
HACKING
HACKING IS THE ACT OF GAINING ACCESS
WITHOUT LEGAL AUTHORIZATION TO A
COMPUTER OR COMPUTER NETWORK. THE
PERSON ENGAGED IN HACKING ACTIVITIES IS
KNOWN AS HACKER. HACKERS ARE USUALLY
SKILLED COMPUTER PROGRAMMERS WITH
KNOWLEDGE OF COMPUTER SECURITY.
SPAMMING IS THE USE OF
ELECTRONIC MESSAGING
SYSTEMS TO SEND AN
UNSOLICITED MESSAGE
(SPAM). A PERSON WHO
CREATES ELECTRONIC SPAM
IS CALLED SPAMMER.
PHISHING IS A METHOD
WHERE CYBER CRIMINALS
BAIT YOU INTO DISCLOSING
THE INFORMATION THEY
WANT
SPAMING & PHISHING
CYBERSTALKING
CYBERSTALKING REFERS TO THE CRIME OF USING
THE INTERNET, EMAIL OR OTHER SOCIAL MEDIA
PLATFORM TO STALK, HARASS OR THREATEN
ANOTHER PERSON. CYBERSTALKING MOST OFTEN
INVOLVES SENDING HARRASING EMAILS, INSTANT
OR TEXT MESSAGES, OR SOCIAL MEDIA POSTS, OR
CREATING WEBSITES FOR THE SOLE PURPOSE OF
TORMENTING THE VICTIM
$%&”@!$%&”@!$%&”@! LOSER!
STUPID!
SOFTWARE PIRACY
SOFTWARE PIRACY IS THE
ILLEGAL COPYING, DISTRIBUTION,
OR USE OF SOFTWARE. SOFTWARE
PIRACY IS THE STEALING OF
LEGALLY PROTECTED SOFTWARE.
UNDER COPYRIGHT LAW,
SOFTWARE PIRACYB OCCURS
WHEN COPYRIGHT PROTECTED
SOFTWARE IS COPIED,
DISTRIBUTED, MODIFIED OR SOLD.
ACCORDING TO THE BUSINESS
SOFTEWARE ALLIANCE(BSA),
ABOUT 36% OF ALL SOFTWARE IN
CURRENT USE IS STOLEN.
BVIRUS DISSEMINATION
Virus Dissemination is a
process of a Malicious
software that attaches itself
to other software. Virus,
worms, Trojan Horse, Time
bomb, Logic Bomb, Rabbit
and Bacterium are examples
of malicious software that
destroys the system of the
victim.
IDENTITY THEFT
IDENTITY THEFT IS THE CRIME OF
OBTAINING THE PERSONAL OR
FINANCIAL INFORMATION OF
ANOTHER PERSON FOR THE SOLE
PURPOSE OF ASSUMING THAT
PERSON’S NAME OR IDENTIY TO
MAKE TRANSACTIONS OR
PURCHASES. IDENTITY THEFT
OCCURS WHEN SOMEONE USES
ANOTHER’S PERSONALLY
IDENTIFYING INFORMATION, LIKE
THEIR NAME, NUMBER, CRDIT
CARD NUMBER, WITHOUT THEIR
PERMISSION.
CYBER CRIMES IN INDIA
CYBER CRIME IN INDIA HAS BEEN EVOLVING
RAPIDLY. THE INFORMATION ACT, 2000 PASSED
BY THE PARLIAMENT OF INDIA IN MAY 2000, HAD
AIMED TO CURB CYBER CRIMES AND TO
PROVIDE LEGAL FRAMEWORK FOR E-
COMMERCE TRANSACTIONS. IN 2001 INDIAAND
USA HAD SET UP AN INDIA-USA CYVER
SECURITY FORUM AS PART OF A COUNTER-
TERRORISM DIALOGUE. CYBERCRIME CASES IN
INDIA, REGISTERED UNDER THE IT ACT,
INCREASED AT A RATE OF 300% BETWEEN 2011 &
2014. IN 2015, THERE WERE 11,592 CASES OF
CYBER CRIME REGISTERED IN INDIA.
HOW TO PREVENT CYBER CRIME
AWARENESS IS THE FIRST STEP IN PROTECTING
YOURSELF, YOUR FAMILY AND YOUR BUSINESS.
NEVER GIVE YOUR FULL NAME OR ADDRESS TO
STRANGERS.
NEVER ENTER YOUR CRDIT CARD NUMBER TO
ANY SITE THAT IS NOT SECURE.
MANAGE YOUR SOCIAL MEDIA SETTINGS TO
KEEP MOST OF YOUR PERSONAL AND PRIVATE
INFO LOCKED DOWN
SECURE YOUR HOME NETWORK WITH STRONG
ENCRYPTION PASSWORD AS WELL AS A VPN
REVIEW FINANCIAL STATEMENTS REGULARLY
DON’T OPEN EMAILS AND ATTACHMENTS
FROM UNKNOWN SOURCES
LEARN MORE ABOUT INTERNET PRIVACY
UNINSTALL UNNECESSARY SOFTWARE
USE HARD-TO-GUESS PASSWORDS.
KEEP YOUR OPERATING SYSTEM UP TO DATE
WITH CRITICAL SECURITY AND UPDATES &
PATHCHES
USE ANTIVIRUS SOFTWARE & FIREWALLS KEEP
THEM UP TO DATE
MAINTAIN BACKUP.
CHECK SECURITY SETTINGS.
CONCLUSION
THE KEY TO PROTECTING YOURSELF IS BEING
AWARE.
TECHNOLOGY IS DESTRUCTIVE ONLY IN THE
HANDS OF PEOPLE WHO DO NOT REALIZE THAT
THEY ARE ONE AND THE SAME PROCESS AS
THE UNIVERSE.
AS INTERNET CONTINUES TO DEVELOP THE
POTENTIAL FOR COMPUTER RELATED CRIME
WILL GROW
CYBER CRIME GREATLE AFFECTS INDIVIDUALS,
BUSINESSES, AND NATINAL SECURITY DUE TO
PERVASIVENESS OF THE INTERNET.
CYBERCRIME IS A MAJOR PROBLEM – AND
GROWING .STAY SECURE, STAY SAFE

More Related Content

What's hot

What's hot (20)

Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Attack on computer
Attack on computerAttack on computer
Attack on computer
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ppt
PptPpt
Ppt
 

Similar to Presentation on cyber crime

Similar to Presentation on cyber crime (20)

Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Business law assignment
Business law assignmentBusiness law assignment
Business law assignment
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Recently uploaded

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Presentation on cyber crime

  • 1.
  • 2. CONTENTS 1) INRODUCTION 2) HISTORY OF CYBER CRIME 3) TYPES OF CYBER CRIME 4) CYBER CRIMES IN INDIA 5) HOW TO PREVENT CYBER CRIME 6) CONCLUSION
  • 3. INTRODUCTION WHAT IS CYBER CRIME? CYBER CRIME REFERS TO ANY ILLEGAL ACTION THAT INVOLVES A NETWORK OR COMPUTER. IN ANY SENSE, THE NETWORK OR COMPUTER MAY HAVE BEEN USED TO COMMIT A CRIME OR MAY BE THE TARGET OF A CRIME. CYBER CRIMES ARE ANY CRIMES THAT INVOLVE A COMPUTER AND A NETWORK. CYBERCRIME MAY THREATEN A PERSON OR NATION’S SECURITY AND FINANCIAL HEALTH.
  • 4. HISTORY CYBERCRIME FIRST STARTED WITH HACKERS TRYING TO BREAK INTO COMPUTER NETWORKS. SOME DID IT JUST FOR THE THRILL OF ACCESSING HIGH- LEVEL SECURITY NETWORKS, BUT OTHERS SOUGHT TO GAIN SENSITIVE, CLASSIFIED MATERIAL. EVENTUALLY, CRIMINALS STARTED TO INFECT COMPUTER SYSTEMS WITH COMPUTER VIRUSES, WHICH LED TO BREAKDOWNS ON PERSONALAND BUSINESS COMPUTERS.
  • 5. TYPES OF CYBER CRIMES HACKING IIDENTITY THEFT VIRUS DISSEMINATION PIRACY CYBER STALKING SPAMING & PHISHING
  • 6. HACKING HACKING IS THE ACT OF GAINING ACCESS WITHOUT LEGAL AUTHORIZATION TO A COMPUTER OR COMPUTER NETWORK. THE PERSON ENGAGED IN HACKING ACTIVITIES IS KNOWN AS HACKER. HACKERS ARE USUALLY SKILLED COMPUTER PROGRAMMERS WITH KNOWLEDGE OF COMPUTER SECURITY.
  • 7. SPAMMING IS THE USE OF ELECTRONIC MESSAGING SYSTEMS TO SEND AN UNSOLICITED MESSAGE (SPAM). A PERSON WHO CREATES ELECTRONIC SPAM IS CALLED SPAMMER. PHISHING IS A METHOD WHERE CYBER CRIMINALS BAIT YOU INTO DISCLOSING THE INFORMATION THEY WANT SPAMING & PHISHING
  • 8. CYBERSTALKING CYBERSTALKING REFERS TO THE CRIME OF USING THE INTERNET, EMAIL OR OTHER SOCIAL MEDIA PLATFORM TO STALK, HARASS OR THREATEN ANOTHER PERSON. CYBERSTALKING MOST OFTEN INVOLVES SENDING HARRASING EMAILS, INSTANT OR TEXT MESSAGES, OR SOCIAL MEDIA POSTS, OR CREATING WEBSITES FOR THE SOLE PURPOSE OF TORMENTING THE VICTIM $%&”@!$%&”@!$%&”@! LOSER! STUPID!
  • 9. SOFTWARE PIRACY SOFTWARE PIRACY IS THE ILLEGAL COPYING, DISTRIBUTION, OR USE OF SOFTWARE. SOFTWARE PIRACY IS THE STEALING OF LEGALLY PROTECTED SOFTWARE. UNDER COPYRIGHT LAW, SOFTWARE PIRACYB OCCURS WHEN COPYRIGHT PROTECTED SOFTWARE IS COPIED, DISTRIBUTED, MODIFIED OR SOLD. ACCORDING TO THE BUSINESS SOFTEWARE ALLIANCE(BSA), ABOUT 36% OF ALL SOFTWARE IN CURRENT USE IS STOLEN.
  • 10. BVIRUS DISSEMINATION Virus Dissemination is a process of a Malicious software that attaches itself to other software. Virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are examples of malicious software that destroys the system of the victim.
  • 11. IDENTITY THEFT IDENTITY THEFT IS THE CRIME OF OBTAINING THE PERSONAL OR FINANCIAL INFORMATION OF ANOTHER PERSON FOR THE SOLE PURPOSE OF ASSUMING THAT PERSON’S NAME OR IDENTIY TO MAKE TRANSACTIONS OR PURCHASES. IDENTITY THEFT OCCURS WHEN SOMEONE USES ANOTHER’S PERSONALLY IDENTIFYING INFORMATION, LIKE THEIR NAME, NUMBER, CRDIT CARD NUMBER, WITHOUT THEIR PERMISSION.
  • 12. CYBER CRIMES IN INDIA CYBER CRIME IN INDIA HAS BEEN EVOLVING RAPIDLY. THE INFORMATION ACT, 2000 PASSED BY THE PARLIAMENT OF INDIA IN MAY 2000, HAD AIMED TO CURB CYBER CRIMES AND TO PROVIDE LEGAL FRAMEWORK FOR E- COMMERCE TRANSACTIONS. IN 2001 INDIAAND USA HAD SET UP AN INDIA-USA CYVER SECURITY FORUM AS PART OF A COUNTER- TERRORISM DIALOGUE. CYBERCRIME CASES IN INDIA, REGISTERED UNDER THE IT ACT, INCREASED AT A RATE OF 300% BETWEEN 2011 & 2014. IN 2015, THERE WERE 11,592 CASES OF CYBER CRIME REGISTERED IN INDIA.
  • 13. HOW TO PREVENT CYBER CRIME AWARENESS IS THE FIRST STEP IN PROTECTING YOURSELF, YOUR FAMILY AND YOUR BUSINESS. NEVER GIVE YOUR FULL NAME OR ADDRESS TO STRANGERS. NEVER ENTER YOUR CRDIT CARD NUMBER TO ANY SITE THAT IS NOT SECURE. MANAGE YOUR SOCIAL MEDIA SETTINGS TO KEEP MOST OF YOUR PERSONAL AND PRIVATE INFO LOCKED DOWN SECURE YOUR HOME NETWORK WITH STRONG ENCRYPTION PASSWORD AS WELL AS A VPN
  • 14. REVIEW FINANCIAL STATEMENTS REGULARLY DON’T OPEN EMAILS AND ATTACHMENTS FROM UNKNOWN SOURCES LEARN MORE ABOUT INTERNET PRIVACY UNINSTALL UNNECESSARY SOFTWARE USE HARD-TO-GUESS PASSWORDS. KEEP YOUR OPERATING SYSTEM UP TO DATE WITH CRITICAL SECURITY AND UPDATES & PATHCHES USE ANTIVIRUS SOFTWARE & FIREWALLS KEEP THEM UP TO DATE MAINTAIN BACKUP. CHECK SECURITY SETTINGS.
  • 15. CONCLUSION THE KEY TO PROTECTING YOURSELF IS BEING AWARE. TECHNOLOGY IS DESTRUCTIVE ONLY IN THE HANDS OF PEOPLE WHO DO NOT REALIZE THAT THEY ARE ONE AND THE SAME PROCESS AS THE UNIVERSE. AS INTERNET CONTINUES TO DEVELOP THE POTENTIAL FOR COMPUTER RELATED CRIME WILL GROW CYBER CRIME GREATLE AFFECTS INDIVIDUALS, BUSINESSES, AND NATINAL SECURITY DUE TO PERVASIVENESS OF THE INTERNET. CYBERCRIME IS A MAJOR PROBLEM – AND GROWING .STAY SECURE, STAY SAFE