SlideShare a Scribd company logo
1 of 28
GRACY J. JOSEPH (T.E. CMPN ENGG.)
CONTENTS
 INTRODUCTION
 HISTORY
 CATEGORIES
 TYPES OF CYBER CRIME
 CYBER CRIMINALS
 CYBER SECURITY
 PREVENTION
 CYBER LAW
 CONCLUSION
INTRODUCTION
Cyber Crime is an activity done by the Computers
and Internet. It is an unlawful acts wherein the
computer is either a tool or a target or both.
HISTORY
 The first recorded cyber crime took place
in 1820.
 That is not surprising considering the fact
that the abacus, which is thought to be the
earliest form of a computer has been
around since 3500 B.C.
 The first virus was installed on an apple
computer in 1982.
CATEGORIES OF CYBER CRIME
 Cyber Crimes against persons
 Cyber Crimes against property
 Cyber Crimes against government
 Cyber Crimes against persons
 Harassment via emails
 Carding
 E-mail/SMS
 Spoofing
 Assault by threat
Cyber Crimes against
property
 Intellectual property crimes
 Cyber Squatting
 Cyber Vandalism
 Transmitting virus
 Internet time theft
Cyber Crimes against
Government
 Terrorism
 Fraud
 Cyber Warfare
TYPES OF CYBER CRIME
Hacking
Child Pornography
Denial of Service Attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Privacy
oHacking
Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
Hacking may refer to:
 Computer hacking
 Phone hacking
 Roof and Tunnel hacking, etc
oChild Pornography
 The internet is being highly used by its
abusers to reach and abuse children
sexually, worldwide.
 Laws regarding child
pornography generally include sexual
images involving prepubescents,
pubescent or post-pubescent minors and
computer-generated images that appear
to involve them.
oDenial of Service Attack
 Act by the criminal, who floods the
bandwidth of the victims network or fills his
e-mail box with spam mail depriving him of
the services he is entitled to access or provide.
 Short for denial-of-service attack, a type
of attack on a network that is designed to
bring the network to its knees by flooding it
with useless traffic. Many DoS attacks, such
as the Ping of Death and Tear drop attacks,
exploit limitations in the TCP/IP protocols.
oVirus Dissemination
 Malicious software that attaches itself
to other software. (viruses, worms,
Trojan, horse, e-mail bombing etc.)
 There are estimated 30,000 computer
viruses in existence.
Over 300 new ones are created each
month
First virus was created to show
loopholes in software.
oComputer Vandalism
 Damaging or destroying data rather
than stealing or misusing them is
called cyber vandalism.
 On the Internet, includes acts such as a
cracker’s replacing the original Web
page with profanity or some racist
oCyber Terrorism
 Use of internet based attacks in terrorist
activities. These terrorists are using 512-bit
encryption, which is impossible to decrypt.
 Cyber terrorism can be also defined as the
intentional use of computer, networks, and
public internet to cause destruction and
harm for personal objectives.
 Objectives may be political or ideological
since this can be seen as a form of terrorism.
oSoftware Privacy
 Theft of software through the illegal copying
of genuine programs.
 Distribution of products intended to pass for
the original.
 The majority of software today is purchased
as a one-site license,
meaning that only one
computer may have that
software installed on it at
one time.
CYBER CRIMINALS
Cyber criminal is an a individual who commits cyber
crime where heshe makes use of the computer either
as a tool or as a target or as a both.
Cybercriminals use computers in three broad ways:
 Select computer as their target: These criminals
attack other people's computers to perform malicious
activities, such as spreading viruses, data theft,
identity theft, etc.
 Uses computer as their weapon: They use the
computer to carry out "conventional crime", such as
spam, fraud, illegal gambling, etc.
 Uses computer as their accessory: They use the
computer to save stolen or illegal data.
TYPES OF CYBER
CRIMINALS
 Script Kiddies
 Scammers
 Hacker groups
 Phishers
 Insiders
 Cyber terrorists
CYBER SECURITY
 Cyber security focuses on protecting computers,
networks, programs and data from unintended or
unauthorized access, change or destruction.
 Computer security, also known as cyber security or
IT security, is the protection of information
systems from theft or damage to the hardware, the
software, and to the information on them, as well
as from disruption or misdirection of the services
they provide.
NEED OF CYBER
SECURITY
 Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from
viruses.
 Hacking, cracking and other forms of cyber
mischief have reached a level of sophistication
equalling (and in many cases surpassing) the
capability of most organizations to defend
against.
ADVANTAGES OF CYBER
SECURITY
 Protects system against viruses, worms,
spyware and other unwanted
programs.
 Protection against data from theft.
 Protects the computer from being
hacked.
 Minimizes computer freezing and
crashes.
 Gives privacy to users
PREVENTION TIPS
 Use strong passwords
 Install the latest OS updates
 Secure your wireless network
 Secure your computer by activating
firewall and using anti-virus software's
 Maintain backups
 Check security settings
CYBER
LAW
 Cyber law is an attempt to integrate the
challenges presented by human activity
on the Internet with legacy system of laws
applicable to the physical world.
IT ACT PROVISIONS
 E-mail would now be a valid and legal form of
communication in our country that can be duly
produced and approved in a court of law.
 Companies shall now be able to carry out electronic
commerce using the legal infrastructure provided
by the Act.
 Digital signatures have been given legal validity and
sanction in the Act.
CYBER LAWS AMENDMENTS
 INDIAN PENAL CODE,1860
 INDIAN EVIDENCE ACT,1872
 BANKER’S BOOK EVIDENCE
ACT,1891
 GENERAL CLAUSES ACT,1897
CONCLUSION
 Technology is destructive only in the hands of
people who do not realize that they are one and
the same process as the universe.
 Cybercrime is a major problem – and growing
 Cybercrime is about much more than hackers
 There is a natural adversarial relationship
between IT and police
 Successful prosecution of cybercrime must be a
team effort
 IT personnel must learn investigation and police
must learn technology
Cyber crime ppt

More Related Content

What's hot

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
Ujjwal Tripathi
 

Viewers also liked (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It presentation cyber crime
It presentation cyber crimeIt presentation cyber crime
It presentation cyber crime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Basic about cyber crime, computer crime
Basic about cyber crime, computer crimeBasic about cyber crime, computer crime
Basic about cyber crime, computer crime
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI
 
66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 

Similar to Cyber crime ppt

cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 

Similar to Cyber crime ppt (20)

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Cyber crime ppt

  • 1. GRACY J. JOSEPH (T.E. CMPN ENGG.)
  • 2. CONTENTS  INTRODUCTION  HISTORY  CATEGORIES  TYPES OF CYBER CRIME  CYBER CRIMINALS  CYBER SECURITY  PREVENTION  CYBER LAW  CONCLUSION
  • 3. INTRODUCTION Cyber Crime is an activity done by the Computers and Internet. It is an unlawful acts wherein the computer is either a tool or a target or both.
  • 4. HISTORY  The first recorded cyber crime took place in 1820.  That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer has been around since 3500 B.C.  The first virus was installed on an apple computer in 1982.
  • 5. CATEGORIES OF CYBER CRIME  Cyber Crimes against persons  Cyber Crimes against property  Cyber Crimes against government
  • 6.  Cyber Crimes against persons  Harassment via emails  Carding  E-mail/SMS  Spoofing  Assault by threat
  • 7. Cyber Crimes against property  Intellectual property crimes  Cyber Squatting  Cyber Vandalism  Transmitting virus  Internet time theft
  • 8. Cyber Crimes against Government  Terrorism  Fraud  Cyber Warfare
  • 9.
  • 10. TYPES OF CYBER CRIME Hacking Child Pornography Denial of Service Attack Virus Dissemination Computer Vandalism Cyber Terrorism Software Privacy
  • 11. oHacking Hacking in simple terms means an illegal intrusion into a computer system and/or network. Hacking may refer to:  Computer hacking  Phone hacking  Roof and Tunnel hacking, etc
  • 12. oChild Pornography  The internet is being highly used by its abusers to reach and abuse children sexually, worldwide.  Laws regarding child pornography generally include sexual images involving prepubescents, pubescent or post-pubescent minors and computer-generated images that appear to involve them.
  • 13. oDenial of Service Attack  Act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.  Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Tear drop attacks, exploit limitations in the TCP/IP protocols.
  • 14. oVirus Dissemination  Malicious software that attaches itself to other software. (viruses, worms, Trojan, horse, e-mail bombing etc.)  There are estimated 30,000 computer viruses in existence. Over 300 new ones are created each month First virus was created to show loopholes in software.
  • 15. oComputer Vandalism  Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.  On the Internet, includes acts such as a cracker’s replacing the original Web page with profanity or some racist
  • 16. oCyber Terrorism  Use of internet based attacks in terrorist activities. These terrorists are using 512-bit encryption, which is impossible to decrypt.  Cyber terrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives.  Objectives may be political or ideological since this can be seen as a form of terrorism.
  • 17. oSoftware Privacy  Theft of software through the illegal copying of genuine programs.  Distribution of products intended to pass for the original.  The majority of software today is purchased as a one-site license, meaning that only one computer may have that software installed on it at one time.
  • 18. CYBER CRIMINALS Cyber criminal is an a individual who commits cyber crime where heshe makes use of the computer either as a tool or as a target or as a both. Cybercriminals use computers in three broad ways:  Select computer as their target: These criminals attack other people's computers to perform malicious activities, such as spreading viruses, data theft, identity theft, etc.  Uses computer as their weapon: They use the computer to carry out "conventional crime", such as spam, fraud, illegal gambling, etc.  Uses computer as their accessory: They use the computer to save stolen or illegal data.
  • 19. TYPES OF CYBER CRIMINALS  Script Kiddies  Scammers  Hacker groups  Phishers  Insiders  Cyber terrorists
  • 20. CYBER SECURITY  Cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.  Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
  • 21. NEED OF CYBER SECURITY  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.  Hacking, cracking and other forms of cyber mischief have reached a level of sophistication equalling (and in many cases surpassing) the capability of most organizations to defend against.
  • 22. ADVANTAGES OF CYBER SECURITY  Protects system against viruses, worms, spyware and other unwanted programs.  Protection against data from theft.  Protects the computer from being hacked.  Minimizes computer freezing and crashes.  Gives privacy to users
  • 23. PREVENTION TIPS  Use strong passwords  Install the latest OS updates  Secure your wireless network  Secure your computer by activating firewall and using anti-virus software's  Maintain backups  Check security settings
  • 24. CYBER LAW  Cyber law is an attempt to integrate the challenges presented by human activity on the Internet with legacy system of laws applicable to the physical world.
  • 25. IT ACT PROVISIONS  E-mail would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law.  Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.  Digital signatures have been given legal validity and sanction in the Act.
  • 26. CYBER LAWS AMENDMENTS  INDIAN PENAL CODE,1860  INDIAN EVIDENCE ACT,1872  BANKER’S BOOK EVIDENCE ACT,1891  GENERAL CLAUSES ACT,1897
  • 27. CONCLUSION  Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.  Cybercrime is a major problem – and growing  Cybercrime is about much more than hackers  There is a natural adversarial relationship between IT and police  Successful prosecution of cybercrime must be a team effort  IT personnel must learn investigation and police must learn technology