SlideShare a Scribd company logo
1 of 24
Presented by
Dheeraj Dani
7737401991
Contents:
 Introduction
 What is Cyber Crime?
 History of cyber crime
 Definition
 Categories of cyber crime
 CYBER ATTACKS STATISTICS 2013
 Cyber criminals
 What is IT Law and Cyber Law
 Phishing
 Botnet
 conclusion
INTRODUCTION
 The internet in India is growing rapidly. It has given

rise to new opportunities in every field we can think
of – be it entertainment, business, sports or
education.

 There are two sides to a coin. Internet also has its

own disadvantages. One of the major disadvantages
is Cyber crime – illegal activity committed on the
internet.
What is Cyber crime???
• Cyber crime is simply defined as crimes that are

directly related
computers.

• An

to

computers

and

using

increasing number of domestic and
international criminal activities are using the
Internet. Computers and other electronic
devices can be tools to commit crime or are
targeted by criminals. A personal computer
connected to the Internet without protection
may be infected with malicious software in
under a minute.
History of Cyber Crime
• In the early decades of modern information technology (IT),

computer crimes were largely committed
disgruntled and dishonest employees.

by

individual

• Physical damage to computer systems was a prominent threat

until the 1980s.

• Criminals often used unauthorized access to subvert security

systems as they modified data for financial gain or destroyed
data for revenge.

• As telecommunications technology spread throughout the IT

world, programmers began writing malicious software,
including self-replicating programs, to interfere with personal
computers.
DEFINING CYBER CRIME
 It’s an unlawful act wherein the computer is

either a tool or a target or both.

 Acts that are punishable by the Information

Technology Act.

 Cyber space is a virtual space that has become

as important as real space for business, politics,
and communities
CATEGORIES OF CIBER CRIME
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government
CYBER ATTACKS STATISTICS(2013)
CYBER CRIMINALS
Insider
Threats
Virus writers
(writes viruses to that
infect systems)

Information
warfare
(alternative to military
attacks)

Hactivists'

(teenage thrill-seekers to
sophisticated criminals)

(overloads e-mail servers
or hack web sites to send
political message)

Criminal
groups

Sensitive
intrusions

(attack systems &
steal password for
financial gain)

(employees)

Hackers

(sensitive information
is obtained via
computer intrusions)

Terrorists

Cyber
Warfare (attack by

(who have potential to
disrupt government
systems with computer
attacks)

sovereigns --- Crime or
Declaration of war)
What is IT Law and Cyber Law
 IT Law is a set of legal enactments, currently in

existence in several countries, which governs
the digital dissemination of both (digitalized)
information and software.

 Cyber law or Internet law is a term that

encapsulates the legal issues related to use of
the Internet. It is less a distinct field of law than
intellectual property or contract law, as it is a
domain covering many areas of law and
regulation. Some leading topics include internet
access and usage, privacy, freedom of
expression.
PHISHING
 A deception designed to steal valuable
personal data, such as credit card
numbers, passwords, account data, or other
information.
GLOBAL PHISHING SURVEY 2012
PEREVENTION
USE STRONG PASSWORDS
SECURE YOUR COMPUTER
1)

ACTIVATE YOUR FIREWALL

2)

USE ANTI-VIRUS

3)

BLOCK SPYWARE ATTACKS
 BE SOCIAL –MEDIA SAVVY
 SECURE YOUR MOBILR DEVICES.
 INSTALL LATEST OS.
 SECURE WIRELESS NETWORK.

 PROTECT YOUR E-IDENTITY
Why India?
A rapidly growing online
user base








121 Million Internet Users
65 Million Active Internet
Users, up by 28% from
51 million in 2010
50 Million users shop
online on Ecommerce and
Online Shopping Sites
46+ Million Social
Network Users
346 million mobile users
had subscribed to Data
Packages.
 The majority of cybercrimes are centered on fraud and








Phishing,
India is the third-most targeted country for Phishing attacks
after the US and the UK,
Social networks as well as ecommerce sites are major targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010,
6,850 .in and 4,150 .com domains were defaced during 2011,
15,000 sites hacked in 2011,
India is the number 1 country in the world for generating
spam.
Botnets
 A network of compromised computers that have

been infected with malicious code, and can be
remotely-controlled through commands sent
via the Internet by a botmaster
 Used for making money! Who pays:

 Internet Advertising companies for downloading

adware onto vulnerable PCs
 Companies who send spam, viruses and other
malware
 Google (unintentionally, see Clickbot.A summary)

 Used for the heck of it
Botnet Threat
 Botnets are a major threat to the Internet
because:
 Consist of a large pool of compromised

computers that are organized by a master.
 a.k.a., Zombie Armies
 Carry out sophisticated attacks to disrupt, gather
sensitive data, or increase armies
 Armies are in the 1000’s to aggregate computing
power
 Communication network allows bots to evolve on
compromised hosts
Attacking Behaviors
 Infecting new hosts



Social engineering and distribution of malicious emails or
other electronic communications (i.e. Instant Messaging)
Example - Email sent with botnet diguised as a harmless
attachment.

 Stealing personal information


Keylogger and Network sniffer technology used on
compromised systems to spy on users and compile personal
information

 Phishing and spam proxy


Aggregated computing power and proxy capability make
allow spammers to impact larger groups without being
traced.

 Distributed Denial of Service (DDoS)


Impair or eliminate availability of a network to extort or
disrupt business
Communication Protocols
 In most cases botnets use well defined and

accepted Communication Protocols.
Understanding the communication protocols
used helps to:

Determine the origins of a botnet attack and the
software being used

Allow researchers to decode conversations
happening between the bots and the masters


 There are two main Communication Protocols

used for bot attacks:



IRC
HTTP
Conclusion
 Cybercrime

greatly

affects

individuals, businesses, and national security due to
the pervasiveness ofthe

Internet

Different countries should work together and use
legal, organizational, and technological approaches
to combat cybercrime
• To reduce the damage to critical infrastructures
• To protect the Internet from being abused
It act and cyber crime
It act and cyber crime

More Related Content

What's hot

What's hot (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Current threats and trends
Current threats and trendsCurrent threats and trends
Current threats and trendsLive Tecnologies
 
DDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and TrendsDDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and TrendsHLL
 
Dowloading as Deviance
Dowloading as DevianceDowloading as Deviance
Dowloading as DevianceJason Rutter
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

Viewers also liked (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Current threats and trends
Current threats and trendsCurrent threats and trends
Current threats and trends
 
DDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and TrendsDDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and Trends
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Dowloading as Deviance
Dowloading as DevianceDowloading as Deviance
Dowloading as Deviance
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Arab spring
Arab springArab spring
Arab spring
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to It act and cyber crime

CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Internet
InternetInternet
InternetJodip
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technologyBinu p jayan
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 

Similar to It act and cyber crime (20)

CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Internet
InternetInternet
Internet
 
English in written
English in writtenEnglish in written
English in written
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 

Recently uploaded

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

It act and cyber crime

  • 2. Contents:  Introduction  What is Cyber Crime?  History of cyber crime  Definition  Categories of cyber crime  CYBER ATTACKS STATISTICS 2013  Cyber criminals  What is IT Law and Cyber Law  Phishing  Botnet  conclusion
  • 3. INTRODUCTION  The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education.  There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
  • 4. What is Cyber crime??? • Cyber crime is simply defined as crimes that are directly related computers. • An to computers and using increasing number of domestic and international criminal activities are using the Internet. Computers and other electronic devices can be tools to commit crime or are targeted by criminals. A personal computer connected to the Internet without protection may be infected with malicious software in under a minute.
  • 5. History of Cyber Crime • In the early decades of modern information technology (IT), computer crimes were largely committed disgruntled and dishonest employees. by individual • Physical damage to computer systems was a prominent threat until the 1980s. • Criminals often used unauthorized access to subvert security systems as they modified data for financial gain or destroyed data for revenge. • As telecommunications technology spread throughout the IT world, programmers began writing malicious software, including self-replicating programs, to interfere with personal computers.
  • 6. DEFINING CYBER CRIME  It’s an unlawful act wherein the computer is either a tool or a target or both.  Acts that are punishable by the Information Technology Act.  Cyber space is a virtual space that has become as important as real space for business, politics, and communities
  • 7. CATEGORIES OF CIBER CRIME 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government
  • 9. CYBER CRIMINALS Insider Threats Virus writers (writes viruses to that infect systems) Information warfare (alternative to military attacks) Hactivists' (teenage thrill-seekers to sophisticated criminals) (overloads e-mail servers or hack web sites to send political message) Criminal groups Sensitive intrusions (attack systems & steal password for financial gain) (employees) Hackers (sensitive information is obtained via computer intrusions) Terrorists Cyber Warfare (attack by (who have potential to disrupt government systems with computer attacks) sovereigns --- Crime or Declaration of war)
  • 10. What is IT Law and Cyber Law  IT Law is a set of legal enactments, currently in existence in several countries, which governs the digital dissemination of both (digitalized) information and software.  Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression.
  • 11. PHISHING  A deception designed to steal valuable personal data, such as credit card numbers, passwords, account data, or other information.
  • 13.
  • 14. PEREVENTION USE STRONG PASSWORDS SECURE YOUR COMPUTER 1) ACTIVATE YOUR FIREWALL 2) USE ANTI-VIRUS 3) BLOCK SPYWARE ATTACKS
  • 15.  BE SOCIAL –MEDIA SAVVY  SECURE YOUR MOBILR DEVICES.  INSTALL LATEST OS.  SECURE WIRELESS NETWORK.  PROTECT YOUR E-IDENTITY
  • 16. Why India? A rapidly growing online user base      121 Million Internet Users 65 Million Active Internet Users, up by 28% from 51 million in 2010 50 Million users shop online on Ecommerce and Online Shopping Sites 46+ Million Social Network Users 346 million mobile users had subscribed to Data Packages.
  • 17.  The majority of cybercrimes are centered on fraud and        Phishing, India is the third-most targeted country for Phishing attacks after the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010, 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.
  • 18. Botnets  A network of compromised computers that have been infected with malicious code, and can be remotely-controlled through commands sent via the Internet by a botmaster  Used for making money! Who pays:  Internet Advertising companies for downloading adware onto vulnerable PCs  Companies who send spam, viruses and other malware  Google (unintentionally, see Clickbot.A summary)  Used for the heck of it
  • 19. Botnet Threat  Botnets are a major threat to the Internet because:  Consist of a large pool of compromised computers that are organized by a master.  a.k.a., Zombie Armies  Carry out sophisticated attacks to disrupt, gather sensitive data, or increase armies  Armies are in the 1000’s to aggregate computing power  Communication network allows bots to evolve on compromised hosts
  • 20. Attacking Behaviors  Infecting new hosts   Social engineering and distribution of malicious emails or other electronic communications (i.e. Instant Messaging) Example - Email sent with botnet diguised as a harmless attachment.  Stealing personal information  Keylogger and Network sniffer technology used on compromised systems to spy on users and compile personal information  Phishing and spam proxy  Aggregated computing power and proxy capability make allow spammers to impact larger groups without being traced.  Distributed Denial of Service (DDoS)  Impair or eliminate availability of a network to extort or disrupt business
  • 21. Communication Protocols  In most cases botnets use well defined and accepted Communication Protocols. Understanding the communication protocols used helps to: Determine the origins of a botnet attack and the software being used  Allow researchers to decode conversations happening between the bots and the masters   There are two main Communication Protocols used for bot attacks:   IRC HTTP
  • 22. Conclusion  Cybercrime greatly affects individuals, businesses, and national security due to the pervasiveness ofthe Internet Different countries should work together and use legal, organizational, and technological approaches to combat cybercrime • To reduce the damage to critical infrastructures • To protect the Internet from being abused