SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Cyber crimes
Presentation on
Introduction to cyber
crime...
What is cyber crime ??
Cyber crime is a generic term that
refers to all criminal activities done
using the medium of computers, the
Internet, cyber space and the
worldwide web.
Cyber law
• Cyber law is a term used to describe the
legal issues related to use of
communications technology, particularly
“cyberspace”, i.e. the Internet.
• Cyber law is an attempt to apply laws
designed for the physical world, to
human activity on the Internet.
Categories of Cyber crimes
• e.g. Hacking, Virus/Worm attacks,
DOS attack etc.
1. The Computer
as a Target :-using
a computer to
attack other
computers.
• e.g. Cyber Terrorism, IPR violations,
Credit card frauds, EFT frauds,
Pornography etc.
2. The computer
as a weapon :-
using a computer
to commit real
world crimes.
We can categorize Cyber crimes in two ways
Another Categorization of Cyber
crimes
Various types of cyber
crime..
1. Hacking
• Hacking is the unauthorized access to a
computer system, programs, data and
network resources.
Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 43(a) read with section 66
is applicable and Section 379 & 406 of Indian
Penal Code, 1860 also are applicable.
• If crime is proved under IT Act, accused shall
be punished for imprisonment, which may
extend to three years or with fine, which may
extend to five lacs rupees or both.
2. Data theft
If any person without permission of the
owner or any other person, who is in charge
of a computer, computer system of computer
network - downloads, copies or extracts any
data, computer data base or information
from such computer, computer system or
computer network including information or
data held or stored in any removable storage
medium, then it is data theft.
Law & Punishment
Under Information Technology (Amendment)
Act, 2008, Section 43(b) read with Section 66
is applicable and under Section 379, 405 &
420 of Indian Penal Code, 1860 also
applicable.
3. Spreading Virus or Worms
• Viruses can do any amount of damage, the creator
intends them to do.
• They can send your data to a third party and then
delete your data from your computer.
• They can also ruin/mess up your system and render it
unusable without a re-installation of the operating
system.
• Usually the virus will install files on your system and
then will change your system so that virus program is
run every time you start your system.
• It will then attempt to replicate itself by sending itself
to other potential victims.
Law & Punishment
Under Information Technology (Amendment)
Act, 2008, Section 43(c) & 43(e) read with
Section 66 is applicable and under Section
268 of Indian Penal Code, 1860 also
applicable.
4. Identity Theft
Identity theft is a form of fraud or cheating of
another person’s identity in which someone
pretends to be someone else by assuming
that person’s identity, typically in order to
access resources or obtain credit and other
benefits in that person’s name.
Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 66-C and Section 419 of
Indian Penal Code, 1860 also applicable.
5. E-Mail Spoofing
• A spoof email is one that appears to originate
from one source but actually has been sent
from another source.
• Hackers use this method to disguise the actual
email address from which phishing and spam
messages are sent and often use email
spoofing in conjunction with Web page
spoofing to trick users into providing personal
and confidential information.
Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 66-C and Section 419 of
Indian Penal Code, 1860 also applicable.
6. Trojan Attack
• The program that act like something useful
but do the things that are quiet damping. The
programs of this kind are called as Trojans.
• The name Trojan Horse is popular.
7. E-mail related crimes
1. Email spoofing
Email spoofing refers to email that appears to have been originated
from one source when it was actually sent from another source.
Please Read
2. Email Spamming
Email "spamming" refers to sending email to thousands and
thousands of users - similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an
attachment or by sending a link of website which on visiting
downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an
identical email message to a particular address.
8. IPR Violations
IPR stands for intellectual proprietary rights.
These include software piracy, copyright
infringement, trademarks violations, theft of
computer source code, patent violations. etc.
9.Data diddling
• Data diddling involves changing data prior or
during input into a computer.
• In other words, information is changed from
the way it should be entered by a person
typing in the data, a virus that changes data,
the programmer of the database or
application, or anyone else involved in the
process of having information stored in a
computer file.
Cyber crime evolution
Cyber crime in different
countries
Documented cases
• June 2012 LinkedIn and eHarmony had been attacked, compromising 65 million passwords, 30,000
passwords were cracked and 1.5 million EHarmony passwords were posted online.[17]
• December 2012 Wells Fargo website experienced a denial of service attack. Potentially
compromising 70 million customers and 8.5 million active viewers. Other banks thought to be
compromised: Bank of America, J. P. Morgan U.S. Bank, and PNC Financial Services[18]
• In January 2012 Zappos.com experienced a security breach after as many as 24 million customers'
credit card numbers, personal information, billing and shipping addresses had been
compromised.[19] On 2 March 2010, Spanish investigators arrested 3[clarification needed] in infection of
over 13 million computers around the world. The "botnet" of infected computers included PCs
inside more than half of the Fortune 1000 companies and more than 40 major banks, according to
investigators.
• In August 2010 the international investigation Operation Delego, operating under the aegis of
the Department of Homeland Security, shut down the international pedophile ring Dreamboard.
The website had approximately 600 members, and may have distributed up to 123 terabytes of
child pornography (roughly equivalent to 16,000 DVDs). To date this is the single largest U.S.
prosecution of an international child pornography ring; 52 arrests were made worldwide.[23]
• April 23, 2013 saw the Associated Press' Twitter account's hacking to release a hoax tweet about
fictional attacks in the White House that left President Obama injured.[24] This erroneous tweet
resulted in a brief plunge of 130 points from the Dow Jones Industrial Average, removal of $136
billion from S&P 500 index,[25] and the temporary suspension of their Twitter account. The Dow
Jones later restored its session gains.
Cyber Security
“Cyber Security” is defined as
protecting information, equipment,
devices computer, computer resource,
communication device and information
stored therein from unauthorized
access, use, disclosure, disruption,
modification or destruction.
Safety tips
• Use antivirus software
• Internet firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings
• Use good passwords
• Individual awareness
Thank you !!

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 

Was ist angesagt? (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 

Andere mochten auch

Andere mochten auch (20)

Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Air India's details
Air India's detailsAir India's details
Air India's details
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Important sections of IPC - By Abirami.G
Important sections of IPC - By Abirami.GImportant sections of IPC - By Abirami.G
Important sections of IPC - By Abirami.G
 
Indian Penal Code
Indian Penal CodeIndian Penal Code
Indian Penal Code
 
Indigo airlines
Indigo airlinesIndigo airlines
Indigo airlines
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Indian Penal Code in India
Indian Penal Code in IndiaIndian Penal Code in India
Indian Penal Code in India
 
Indian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo calebIndian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo caleb
 
Ipc ppt
Ipc pptIpc ppt
Ipc ppt
 
Strategy Management at IndiGo Airlines
Strategy Management at IndiGo AirlinesStrategy Management at IndiGo Airlines
Strategy Management at IndiGo Airlines
 
General exceptions Indian Penal Code, (S. 76 to 106)
General  exceptions Indian Penal Code, (S. 76 to 106)General  exceptions Indian Penal Code, (S. 76 to 106)
General exceptions Indian Penal Code, (S. 76 to 106)
 
IndiGo Airlines
IndiGo Airlines IndiGo Airlines
IndiGo Airlines
 
IndiGo Airlines
IndiGo Airlines IndiGo Airlines
IndiGo Airlines
 
Air india
Air indiaAir india
Air india
 
The Indian Penal Code.
The Indian Penal Code.The Indian Penal Code.
The Indian Penal Code.
 
Indian Penal Code,1860
Indian Penal Code,1860Indian Penal Code,1860
Indian Penal Code,1860
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An Introduction
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 

Ähnlich wie Cyber crime

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Internet
InternetInternet
InternetJodip
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 

Ähnlich wie Cyber crime (20)

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
English in written
English in writtenEnglish in written
English in written
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Internet
InternetInternet
Internet
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Final ppt
Final pptFinal ppt
Final ppt
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 

Kürzlich hochgeladen

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 

Kürzlich hochgeladen (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 

Cyber crime

  • 3. What is cyber crime ?? Cyber crime is a generic term that refers to all criminal activities done using the medium of computers, the Internet, cyber space and the worldwide web.
  • 4. Cyber law • Cyber law is a term used to describe the legal issues related to use of communications technology, particularly “cyberspace”, i.e. the Internet. • Cyber law is an attempt to apply laws designed for the physical world, to human activity on the Internet.
  • 5.
  • 7. • e.g. Hacking, Virus/Worm attacks, DOS attack etc. 1. The Computer as a Target :-using a computer to attack other computers. • e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc. 2. The computer as a weapon :- using a computer to commit real world crimes. We can categorize Cyber crimes in two ways
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Various types of cyber crime..
  • 14. 1. Hacking • Hacking is the unauthorized access to a computer system, programs, data and network resources.
  • 15. Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 43(a) read with section 66 is applicable and Section 379 & 406 of Indian Penal Code, 1860 also are applicable. • If crime is proved under IT Act, accused shall be punished for imprisonment, which may extend to three years or with fine, which may extend to five lacs rupees or both.
  • 16. 2. Data theft If any person without permission of the owner or any other person, who is in charge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium, then it is data theft.
  • 17. Law & Punishment Under Information Technology (Amendment) Act, 2008, Section 43(b) read with Section 66 is applicable and under Section 379, 405 & 420 of Indian Penal Code, 1860 also applicable.
  • 18. 3. Spreading Virus or Worms • Viruses can do any amount of damage, the creator intends them to do. • They can send your data to a third party and then delete your data from your computer. • They can also ruin/mess up your system and render it unusable without a re-installation of the operating system. • Usually the virus will install files on your system and then will change your system so that virus program is run every time you start your system. • It will then attempt to replicate itself by sending itself to other potential victims.
  • 19. Law & Punishment Under Information Technology (Amendment) Act, 2008, Section 43(c) & 43(e) read with Section 66 is applicable and under Section 268 of Indian Penal Code, 1860 also applicable.
  • 20. 4. Identity Theft Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.
  • 21. Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 66-C and Section 419 of Indian Penal Code, 1860 also applicable.
  • 22. 5. E-Mail Spoofing • A spoof email is one that appears to originate from one source but actually has been sent from another source. • Hackers use this method to disguise the actual email address from which phishing and spam messages are sent and often use email spoofing in conjunction with Web page spoofing to trick users into providing personal and confidential information.
  • 23. Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 66-C and Section 419 of Indian Penal Code, 1860 also applicable.
  • 24. 6. Trojan Attack • The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. • The name Trojan Horse is popular.
  • 25. 7. E-mail related crimes 1. Email spoofing Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Please Read 2. Email Spamming Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter. 3 Sending malicious codes through email E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code. 4. Email bombing E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.
  • 26. 8. IPR Violations IPR stands for intellectual proprietary rights. These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. etc.
  • 27. 9.Data diddling • Data diddling involves changing data prior or during input into a computer. • In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file.
  • 29.
  • 30. Cyber crime in different countries
  • 31.
  • 32. Documented cases • June 2012 LinkedIn and eHarmony had been attacked, compromising 65 million passwords, 30,000 passwords were cracked and 1.5 million EHarmony passwords were posted online.[17] • December 2012 Wells Fargo website experienced a denial of service attack. Potentially compromising 70 million customers and 8.5 million active viewers. Other banks thought to be compromised: Bank of America, J. P. Morgan U.S. Bank, and PNC Financial Services[18] • In January 2012 Zappos.com experienced a security breach after as many as 24 million customers' credit card numbers, personal information, billing and shipping addresses had been compromised.[19] On 2 March 2010, Spanish investigators arrested 3[clarification needed] in infection of over 13 million computers around the world. The "botnet" of infected computers included PCs inside more than half of the Fortune 1000 companies and more than 40 major banks, according to investigators. • In August 2010 the international investigation Operation Delego, operating under the aegis of the Department of Homeland Security, shut down the international pedophile ring Dreamboard. The website had approximately 600 members, and may have distributed up to 123 terabytes of child pornography (roughly equivalent to 16,000 DVDs). To date this is the single largest U.S. prosecution of an international child pornography ring; 52 arrests were made worldwide.[23] • April 23, 2013 saw the Associated Press' Twitter account's hacking to release a hoax tweet about fictional attacks in the White House that left President Obama injured.[24] This erroneous tweet resulted in a brief plunge of 130 points from the Dow Jones Industrial Average, removal of $136 billion from S&P 500 index,[25] and the temporary suspension of their Twitter account. The Dow Jones later restored its session gains.
  • 33. Cyber Security “Cyber Security” is defined as protecting information, equipment, devices computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction.
  • 34. Safety tips • Use antivirus software • Internet firewalls • Uninstall unnecessary software • Maintain backup • Check security settings • Use good passwords • Individual awareness