SlideShare ist ein Scribd-Unternehmen logo
1 von 29
CYBER CRIME ✔
AND
SECURITY 🔐
PRESNTED BY :- Kartavya Som , Manish Singh,
Ayush Chauhan , Viipin Ranga, Vansh Baliyan , Vansh Malik
CLASS :- X-B
CONTENT
• INTRODUCTION
• DEFINATION
• HISTORY
• CYBER THREAT EVOLUTION
• CATEGORIES OF CYBER CRIME
• PREVENTION
• SECURITY
• CONCLUSION
INTRODUCTIO
N
• Cyber crime is not an old sort of crime to the world. It is
defined as any criminal activity which takes place on or
over the medium of computers or internet or other
technology recognised by the Information Technology
Act. Cyber crime is the most prevalent crime playing a
devastating role in Modern India.
• OR WHAT DO YOU MEAN BY CYBER CRIME ?
• cybercrime, also called computer crime, the use of a
computer as an instrument to further illegal ends,
such as committing fraud, trafficking in child pornography
and intellectual property, stealing identities, or violating
privacy.
DEFINATION
• Cybercrime refers to the use of a computer to
commit a crime. As a criminal activity, it began
when hackers started illegally accessing high-
level computer networks. Some examples of
cybercrime include credit card and identity theft,
network intrusions and software piracy.
• Cybercrime is a crime that involves a computer
and a network. The computer may have been
used in the commission of a crime, or it may be
the target. Cybercrime may harm someone's
security and financial health.
HISTORY
• Cybercrime first started with hackers
trying to break into computer networks.
Some did it just for the thrill of accessing
high-level security networks, but others
sought to gain sensitive, classified
material. ... Computer hackers also
engage in phishing scams, like asking for
bank account numbers, and credit card
theft.
CYBER THREAT
EVOLUTION
• Cyberthreat has been in existence since the
early stages of communication and is
evolving since then with the subsequent
development of technology. From Landline
hacking in the 1970s to cryptojacking in 2021,
cybercrimes tend to become more and more
sophisticated with time. With every passing
decade, the technological society and
cybersecurity professionals find themselves
amidst highly coordinated and relentless
attacks on digital assets and infrastructure,
where the existing solution or defense either
What is cyber crime and
its types ?
• Here are some specific examples of the
different types of cybercrime: Email and
internet fraud. Identity fraud (where
personal information is stolen and used).
Theft of financial or card payment data. ...
Cyberespionage (where hackers access
government or company data).
What Are the Top Five
Cybercrimes?
• #1 Phishing. “Tap on this link and win a
million dollars right away!” Sounds too
good to be true, right? ...
• #2 Cyber Extortion. ...
• #3 Data breach. ...
• #4 Identity theft. ...
• #5 Harassment.
What is cybercrime?
• Cybercrime is criminal activity that
either targets or uses a computer, a
computer network or a networked device.
Most, but not all, cybercrime is committed
by cybercriminals or hackers who want to
make money. Cybercrime is carried out by
individuals or organizations.
What is the introduction of cyber
crime?
• Cyber crime is not an old sort of crime to
the world. It is defined as any criminal
activity which takes place on or over
the medium of computers or internet or
other technology recognised by the
Information Technology Act. Cyber
crime is the most prevalent crime playing a
devastating role in Modern India.
What is the most common cyber
crime ?
• 5 most common types of cybercrimes:
• Phishing scams: ...
• Internet fraud: ...
• Online intellectual property infringements:
...
• Identity theft: ...
• Online harassment and cyberstalking:
Why is it called cyber?
• What does cyber mean? Prior to the
advent of the internet, cyber was used in
the formation of words relating to
computers, computer networks, or
virtual reality. This usage can be traced
to the word cybernetics, which was
ushered into English in the 1940s by the
scientist Norbert Wiener.
How can we stay safe from cyber
crimes?
• Strong Passwords
• Ensure your software is up-to-date. ...
• Don't fall for pop-ups. ...
• Secure your internet network with a strong
encryption password and a VPN. ...
• Manage your social media settings. ...
• Protect yourself from identity threats. ...
• Educate your children about internet risks. ...
• Secure your computer and mobile devices.
What is the punishment of cyber
crime in India?
• Penalties under Cyber Crimes:-
Section 43 and 66 of the IT Act punishes a
person committing data theft, transmitting
virus into a system, hacking, destroying
data, or denying access to the network to
an authorized person with maximum
imprisonment up to 3 years or a fine of
rupees 5 lacs or both.
What is the full form of cyber?
• CYBER Stands For : Changing
Yesterdays Behavior For
Enhanced Results | Childrens
Yearly Best Ever Reads.
What was the first cyber crime?
• 1834 — French Telegraph
System — A pair of thieves hack the
French Telegraph System and steal
financial market information,
effectively conducting the world's first
cyberattack.
How many sections are there in
cyber law?
• This Act has 90 Sections.
AND ALL SECTION ON NEXT PAGE
👍
Cyber law is the part of the overall legal system that deals with the internet, cyberspace,
and their respective legal issues. Cyber law covers a fairly broad area covering several
subtopics including freedom of expression, access to and usage of the internet, and
online privacy. Generically, cyber law is referred to as the Law of the Internet.
Cyber Law is a generic term referring to all the legal and regulatory aspects of the
internet. Everything concerned with or related to or emanating from any legal aspects or
concerning any activities of the citizens in the cyberspace comes within the ambit of
cyber laws. Cyber law covers legal issues which are related to the use of communicative,
transactional, and distributive aspects of network information technologies and devices.
It encompasses the legal, statutory, and constitutional provisions which affect computers
and networks.
History
The Information Technology Act, 2000 came into force on 17 October 2000. This Act applies to whole of India, and its provisions also apply to any
offense or contravention, committed even outside the territorial jurisdiction of Republic of India, by any person irrespective of his nationality. In order to
attract provisions of this Act, such an offence or contravention should involve a computer, computer system, or computer network located in India. The
IT Act 2000 provides an extraterritorial applicability to its provisions by virtue of Section 1(2) read with Section 75. This Act has 90 Sections.
India's The Information Technology Act 2000 has tried to assimilate legal principles available in several such laws (relating to information technology)
enacted earlier in several other countries, as also various guidelines pertaining to information technology law. The Act gives legal validity to electronic
contracts, recognition of electronic signatures. This is a modern legislation which makes acts like hacking, data theft, spreading of virus, identity theft,
defamation (sending offensive messages) pornography, child pornography, cyber terrorism, a criminal offence.
The Act is supplemented by a number of rules which includes rules for cyber cafes,
electronic service delivery, data security, blocking of websites. It also has rules for
observance of due diligence by internet intermediaries (ISP's, network service providers,
cyber cafes, etc.). Any person affected by data theft, hacking, spreading of viruses can
apply for compensation from Adjudicator appointed under Section 46 as well as file a
criminal complaint. Appeal from adjudicator lies to Cyber Appellate Tribunal.
Offences
Section 65 - Tampering with computer source documents
If a person knowingly or intentionally conceals, destroys or alters or intentionally or
knowingly causes another to conceal, destroy or alter any computer source code used for
a computer, computer programme, computer system or computer network, when the
computer source code is required to be kept or maintained by law for the time being in
force.
Penalty - Imprisonment up to three years, or/and with fine up to RS 200,000
Section 66 – Hacking with computer system
If a person with the intent to cause or knowing that he is likely to cause wrongful loss or
damage to the public or any person destroys or deletes or alters any information residing
in a computer resource or diminishes its value or utility or affects it injuriously by any
means, commits hack.
Penalty - Imprisonment up to three years, or/and with fine up to RS 500,000
Section 66B - Receiving stolen computer or communication device
A person receives or retains a computer resource or communication device which is
known to be stolen or the person has reason to believe is stolen.
Penalty - Imprisonment up to three years, or/and with fine up to RS 100,000
Section 66C – Using password of another person
A person fraudulently uses the password, digital signature or other unique identification
of another person.
Penalty - Imprisonment up to three years, or/and with fine up to RS 100,000
Section 66D – Cheating using computer resource
If a person cheats someone using a computer resource or communication.
Penalty - Imprisonment up to three years, or/and with fine up to RS 100,000
Section 66E – Publishing private images of others
If a person captures, transmits or publishes images of a person's private parts without
his/her consent or knowledge.
Penalty - Imprisonment up to three years, or/and with fine up to RS 200,000
Section 66F – Act of cyber terrorism
If a person denies access to authorized personnel to a computer resource, accesses a
protected system or introduces contaminant into a system, with the intention of
threatening the unity, integrity, sovereignty or security of India, then he commits cyber
terrorism.
Section 67 - Publishing information which is obscene in e-form
If a person publishes or transmits or causes to be published in the electronic form, any
material which is lascivious or appeals to the prurient interest or if its effect is such as to
tend to deprave and corrupt persons who are likely, having regard to all relevant
circumstances, to read, see or hear the matter contained or embodied in it.
Penalty - Imprisonment up to five years, or/and with fine up to RS 1,000,000
Section 67A - Publishing images containing sexual acts
If a person publishes or transmits images containing a sexual explicit act or conduct.
Penalty- Imprisonment up to seven years, or/and with fine up to RS 1,000,000
Section 67B – Publishing child porn or predating children online
If a person captures, publishes or transmits images of a child in a sexually explicit act or
conduct. If a person induces a child into a sexual act. A child is defined as anyone under 18.
Penalty- Imprisonment up to five years, or/and with fine up to RS 1,000,000 on first
conviction. Imprisonment up to seven years, or/and with fine up to RS 1,000,000 on second
conviction.
Section 67C - Failure to maintain records
Persons deemed as intermediary (such as an ISP) must maintain required records for
stipulated time. Failure is an offence.
Penalty- Imprisonment up to three years, or/and with fine.
Section 69 - Failure/refusal to decrypt data
If the Controller is satisfied that it is necessary or expedient so to do in the interest of
the sovereignty or integrity of India, the security of the State, friendly relations with
foreign States or public order or for preventing incitement to the commission of any
cognizable offence, for reasons to be recorded in writing, by order, direct any agency of
the Government to intercept any information transmitted through any computer
resource. The subscriber or any person in charge of the computer resource shall, when
called upon by any agency which has been directed, must extend all facilities and
technical assistance to decrypt the information. The subscriber or any person who fails
to assist the agency referred is deemed to have committed a crime.
Penalty- Imprisonment up to seven years and possible fine.
Section 66A
In September 2012, a freelance cartoonist Aseem Trivedi was arrested under the Section 66A of
the IT Act, Section 2 of Prevention of Insults to National Honor Act, 1971 and for sedition under
the Section 124 of the Indian Penal Code. His cartoons depicting widespread corruption in India
were considered offensive.
On 12 April 2012, a Chemistry professor from Jadavpur University, Ambikesh Mahapatra, was
arrested for sharing a cartoon of West Bengal Chief Minister Mamata Banerjee and then Railway
Minister Mukul Roy. The email was sent from the email address of a housing society. Subrata
Sengupta, the secretary of the housing society, was also arrested. They were charged under
Section 66A and B of the IT Act, for defamation under Sections 500, for obscene gesture to a
woman under Section 509, and abetting a crime under Section 114 of the Indian Penal Code.
On 30 October 2012, a Pondicherry businessman Ravi Srinivasan was arrested under Section
66A. He had sent tweet accusing Karti Chidambaram, son of then Finance Minister P.
Chidambaram, of corruption. Karti Chidambaram had complained to the police.
On 19 November 2012, a 21-year-old girl was arrested from Palghar for posting a message on
Face book criticizing the shutdown in Mumbai for the funeral of Bal Thackeray. Another 20-year-
old girl was arrested for "liking" the post. They were initially charged under Section 295A of the
Indian Penal Code (hurting religious sentiments) and Section 66A of the IT Act. Later, Section
295A was replaced by Section 505(2) (promoting enmity between classes). A group of Shiv Sena
workers vandalised a hospital run by the uncle of one of girls.
CATEGORIES OF CYBER
CRIME
• DDoS Attacks. These are used to make an
online service unavailable and take the
network down by overwhelming the site with
traffic from a variety of sources. ...
• Botnets. ...
• Identity Theft. ...
• Cyberstalking. ...
• Social Engineering. ...
• PUPs. ...
• Phishing. ...
• Prohibited/Illegal Content.
PREVENTION
• Download applications from trusted
sources. Keep your applications and
operating system (e.g. Windows, Mac,
Linux) current with the latest system
updates. Turn on automatic updates to
prevent potential attacks on older
software. Make regular back-ups of all
your important data, and store it in another
location.
Cyber security
• Cyber security is the application of
technologies, processes and controls to
protect systems, networks, programs,
devices and data from cyber attacks.
• It aims to reduce the risk of cyber
attacks and protect against the
unauthorised exploitation of systems,
networks and technologies.
CONCLUSION
• Though not all people are victims to cyber
crimes, they are still at risk. Crimes by
computer vary, and they don�t always occur
behind the computer, but they executed by
computer. The hacker�s identity is ranged
between 12 years young to 67years old. The
hacker could live three continents away from
its victim, and they wouldn�t even know they
were being hacked. Crimes done behind the
computer are the 21st century�s problem.
With the technology increasing, criminals
don�t have to rob banks, nor do they have
to be outside in order to commit any crime.
They have everything they need on their lap.
THIS PPT IS DONE WITH HELP OF :- KARTAVYA SOM,MANISH SINGH,AYUSH CHAUHAN,
VANSH BALIYAN,VANSH MALIK (NEW),VIPIN RANGA
OF CLASS:- X-B ✔
FOLLOW ME :- 👍👍

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 

Ähnlich wie Cyber crime ✔

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfShylesh BC
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Parag Deodhar
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 

Ähnlich wie Cyber crime ✔ (20)

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
English in written
English in writtenEnglish in written
English in written
 

Kürzlich hochgeladen

Jeremy Casson - Top Tips for Pottery Wheel Throwing
Jeremy Casson - Top Tips for Pottery Wheel ThrowingJeremy Casson - Top Tips for Pottery Wheel Throwing
Jeremy Casson - Top Tips for Pottery Wheel ThrowingJeremy Casson
 
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | DelhiSaketCallGirlsCallUs
 
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Servicesonnydelhi1992
 
Young⚡Call Girls in Tughlakabad Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Tughlakabad Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Tughlakabad Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Tughlakabad Delhi >༒9667401043 Escort Servicesonnydelhi1992
 
Bobbie goods coloring book 81 pag_240127_163802.pdf
Bobbie goods coloring book 81 pag_240127_163802.pdfBobbie goods coloring book 81 pag_240127_163802.pdf
Bobbie goods coloring book 81 pag_240127_163802.pdfMARIBEL442158
 
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112Nitya salvi
 
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶delhimunirka444
 
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | DelhiFULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | DelhiSaketCallGirlsCallUs
 
AaliyahBell_themist_v01.pdf .
AaliyahBell_themist_v01.pdf             .AaliyahBell_themist_v01.pdf             .
AaliyahBell_themist_v01.pdf .AaliyahB2
 
Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...
Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...
Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...Jeremy Casson
 
Deconstructing Gendered Language; Feminist World-Making 2024
Deconstructing Gendered Language; Feminist World-Making 2024Deconstructing Gendered Language; Feminist World-Making 2024
Deconstructing Gendered Language; Feminist World-Making 2024samlnance
 
Amelia's Dad's Father of the Bride Speech
Amelia's Dad's Father of the Bride SpeechAmelia's Dad's Father of the Bride Speech
Amelia's Dad's Father of the Bride Speechdavidbearn1
 
Editorial sephora annual report design project
Editorial sephora annual report design projectEditorial sephora annual report design project
Editorial sephora annual report design projecttbatkhuu1
 
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| DelhiDELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhidelhimunirka444
 
FULL NIGHT — 9999894380 Call Girls In Delhi | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi | DelhiFULL NIGHT — 9999894380 Call Girls In Delhi | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi | DelhiSaketCallGirlsCallUs
 

Kürzlich hochgeladen (20)

Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
 
Jeremy Casson - Top Tips for Pottery Wheel Throwing
Jeremy Casson - Top Tips for Pottery Wheel ThrowingJeremy Casson - Top Tips for Pottery Wheel Throwing
Jeremy Casson - Top Tips for Pottery Wheel Throwing
 
UAE Call Girls # 0528675665 # Independent Call Girls In Dubai ~ (UAE)
UAE Call Girls # 0528675665 # Independent Call Girls In Dubai ~ (UAE)UAE Call Girls # 0528675665 # Independent Call Girls In Dubai ~ (UAE)
UAE Call Girls # 0528675665 # Independent Call Girls In Dubai ~ (UAE)
 
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
 
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
 
Young⚡Call Girls in Tughlakabad Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Tughlakabad Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Tughlakabad Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Tughlakabad Delhi >༒9667401043 Escort Service
 
Bobbie goods coloring book 81 pag_240127_163802.pdf
Bobbie goods coloring book 81 pag_240127_163802.pdfBobbie goods coloring book 81 pag_240127_163802.pdf
Bobbie goods coloring book 81 pag_240127_163802.pdf
 
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
 
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
 
(INDIRA) Call Girl Jammu Call Now 8617697112 Jammu Escorts 24x7
(INDIRA) Call Girl Jammu Call Now 8617697112 Jammu Escorts 24x7(INDIRA) Call Girl Jammu Call Now 8617697112 Jammu Escorts 24x7
(INDIRA) Call Girl Jammu Call Now 8617697112 Jammu Escorts 24x7
 
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | DelhiFULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
 
Dubai Call Girls # 00971528860074 # 24/7 Call Girls In Dubai || (UAE)
Dubai Call Girls # 00971528860074 # 24/7 Call Girls In Dubai || (UAE)Dubai Call Girls # 00971528860074 # 24/7 Call Girls In Dubai || (UAE)
Dubai Call Girls # 00971528860074 # 24/7 Call Girls In Dubai || (UAE)
 
AaliyahBell_themist_v01.pdf .
AaliyahBell_themist_v01.pdf             .AaliyahBell_themist_v01.pdf             .
AaliyahBell_themist_v01.pdf .
 
Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...
Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...
Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...
 
Deconstructing Gendered Language; Feminist World-Making 2024
Deconstructing Gendered Language; Feminist World-Making 2024Deconstructing Gendered Language; Feminist World-Making 2024
Deconstructing Gendered Language; Feminist World-Making 2024
 
Deira Call Girls # 0588312479 # Call Girls In Deira Dubai ~ (UAE)
Deira Call Girls # 0588312479 # Call Girls In Deira Dubai ~ (UAE)Deira Call Girls # 0588312479 # Call Girls In Deira Dubai ~ (UAE)
Deira Call Girls # 0588312479 # Call Girls In Deira Dubai ~ (UAE)
 
Amelia's Dad's Father of the Bride Speech
Amelia's Dad's Father of the Bride SpeechAmelia's Dad's Father of the Bride Speech
Amelia's Dad's Father of the Bride Speech
 
Editorial sephora annual report design project
Editorial sephora annual report design projectEditorial sephora annual report design project
Editorial sephora annual report design project
 
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| DelhiDELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
 
FULL NIGHT — 9999894380 Call Girls In Delhi | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi | DelhiFULL NIGHT — 9999894380 Call Girls In Delhi | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi | Delhi
 

Cyber crime ✔

  • 1. CYBER CRIME ✔ AND SECURITY 🔐 PRESNTED BY :- Kartavya Som , Manish Singh, Ayush Chauhan , Viipin Ranga, Vansh Baliyan , Vansh Malik CLASS :- X-B
  • 2. CONTENT • INTRODUCTION • DEFINATION • HISTORY • CYBER THREAT EVOLUTION • CATEGORIES OF CYBER CRIME • PREVENTION • SECURITY • CONCLUSION
  • 3. INTRODUCTIO N • Cyber crime is not an old sort of crime to the world. It is defined as any criminal activity which takes place on or over the medium of computers or internet or other technology recognised by the Information Technology Act. Cyber crime is the most prevalent crime playing a devastating role in Modern India. • OR WHAT DO YOU MEAN BY CYBER CRIME ? • cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.
  • 4. DEFINATION • Cybercrime refers to the use of a computer to commit a crime. As a criminal activity, it began when hackers started illegally accessing high- level computer networks. Some examples of cybercrime include credit card and identity theft, network intrusions and software piracy. • Cybercrime is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may harm someone's security and financial health.
  • 5. HISTORY • Cybercrime first started with hackers trying to break into computer networks. Some did it just for the thrill of accessing high-level security networks, but others sought to gain sensitive, classified material. ... Computer hackers also engage in phishing scams, like asking for bank account numbers, and credit card theft.
  • 6. CYBER THREAT EVOLUTION • Cyberthreat has been in existence since the early stages of communication and is evolving since then with the subsequent development of technology. From Landline hacking in the 1970s to cryptojacking in 2021, cybercrimes tend to become more and more sophisticated with time. With every passing decade, the technological society and cybersecurity professionals find themselves amidst highly coordinated and relentless attacks on digital assets and infrastructure, where the existing solution or defense either
  • 7. What is cyber crime and its types ? • Here are some specific examples of the different types of cybercrime: Email and internet fraud. Identity fraud (where personal information is stolen and used). Theft of financial or card payment data. ... Cyberespionage (where hackers access government or company data).
  • 8. What Are the Top Five Cybercrimes? • #1 Phishing. “Tap on this link and win a million dollars right away!” Sounds too good to be true, right? ... • #2 Cyber Extortion. ... • #3 Data breach. ... • #4 Identity theft. ... • #5 Harassment.
  • 9. What is cybercrime? • Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations.
  • 10. What is the introduction of cyber crime? • Cyber crime is not an old sort of crime to the world. It is defined as any criminal activity which takes place on or over the medium of computers or internet or other technology recognised by the Information Technology Act. Cyber crime is the most prevalent crime playing a devastating role in Modern India.
  • 11. What is the most common cyber crime ? • 5 most common types of cybercrimes: • Phishing scams: ... • Internet fraud: ... • Online intellectual property infringements: ... • Identity theft: ... • Online harassment and cyberstalking:
  • 12. Why is it called cyber? • What does cyber mean? Prior to the advent of the internet, cyber was used in the formation of words relating to computers, computer networks, or virtual reality. This usage can be traced to the word cybernetics, which was ushered into English in the 1940s by the scientist Norbert Wiener.
  • 13. How can we stay safe from cyber crimes? • Strong Passwords • Ensure your software is up-to-date. ... • Don't fall for pop-ups. ... • Secure your internet network with a strong encryption password and a VPN. ... • Manage your social media settings. ... • Protect yourself from identity threats. ... • Educate your children about internet risks. ... • Secure your computer and mobile devices.
  • 14. What is the punishment of cyber crime in India? • Penalties under Cyber Crimes:- Section 43 and 66 of the IT Act punishes a person committing data theft, transmitting virus into a system, hacking, destroying data, or denying access to the network to an authorized person with maximum imprisonment up to 3 years or a fine of rupees 5 lacs or both.
  • 15. What is the full form of cyber? • CYBER Stands For : Changing Yesterdays Behavior For Enhanced Results | Childrens Yearly Best Ever Reads.
  • 16. What was the first cyber crime? • 1834 — French Telegraph System — A pair of thieves hack the French Telegraph System and steal financial market information, effectively conducting the world's first cyberattack.
  • 17. How many sections are there in cyber law? • This Act has 90 Sections. AND ALL SECTION ON NEXT PAGE 👍
  • 18. Cyber law is the part of the overall legal system that deals with the internet, cyberspace, and their respective legal issues. Cyber law covers a fairly broad area covering several subtopics including freedom of expression, access to and usage of the internet, and online privacy. Generically, cyber law is referred to as the Law of the Internet. Cyber Law is a generic term referring to all the legal and regulatory aspects of the internet. Everything concerned with or related to or emanating from any legal aspects or concerning any activities of the citizens in the cyberspace comes within the ambit of cyber laws. Cyber law covers legal issues which are related to the use of communicative, transactional, and distributive aspects of network information technologies and devices. It encompasses the legal, statutory, and constitutional provisions which affect computers and networks. History The Information Technology Act, 2000 came into force on 17 October 2000. This Act applies to whole of India, and its provisions also apply to any offense or contravention, committed even outside the territorial jurisdiction of Republic of India, by any person irrespective of his nationality. In order to attract provisions of this Act, such an offence or contravention should involve a computer, computer system, or computer network located in India. The IT Act 2000 provides an extraterritorial applicability to its provisions by virtue of Section 1(2) read with Section 75. This Act has 90 Sections. India's The Information Technology Act 2000 has tried to assimilate legal principles available in several such laws (relating to information technology) enacted earlier in several other countries, as also various guidelines pertaining to information technology law. The Act gives legal validity to electronic contracts, recognition of electronic signatures. This is a modern legislation which makes acts like hacking, data theft, spreading of virus, identity theft, defamation (sending offensive messages) pornography, child pornography, cyber terrorism, a criminal offence.
  • 19. The Act is supplemented by a number of rules which includes rules for cyber cafes, electronic service delivery, data security, blocking of websites. It also has rules for observance of due diligence by internet intermediaries (ISP's, network service providers, cyber cafes, etc.). Any person affected by data theft, hacking, spreading of viruses can apply for compensation from Adjudicator appointed under Section 46 as well as file a criminal complaint. Appeal from adjudicator lies to Cyber Appellate Tribunal. Offences Section 65 - Tampering with computer source documents If a person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force. Penalty - Imprisonment up to three years, or/and with fine up to RS 200,000 Section 66 – Hacking with computer system If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack. Penalty - Imprisonment up to three years, or/and with fine up to RS 500,000
  • 20. Section 66B - Receiving stolen computer or communication device A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen. Penalty - Imprisonment up to three years, or/and with fine up to RS 100,000 Section 66C – Using password of another person A person fraudulently uses the password, digital signature or other unique identification of another person. Penalty - Imprisonment up to three years, or/and with fine up to RS 100,000 Section 66D – Cheating using computer resource If a person cheats someone using a computer resource or communication. Penalty - Imprisonment up to three years, or/and with fine up to RS 100,000 Section 66E – Publishing private images of others If a person captures, transmits or publishes images of a person's private parts without his/her consent or knowledge. Penalty - Imprisonment up to three years, or/and with fine up to RS 200,000 Section 66F – Act of cyber terrorism If a person denies access to authorized personnel to a computer resource, accesses a protected system or introduces contaminant into a system, with the intention of threatening the unity, integrity, sovereignty or security of India, then he commits cyber terrorism.
  • 21. Section 67 - Publishing information which is obscene in e-form If a person publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it. Penalty - Imprisonment up to five years, or/and with fine up to RS 1,000,000 Section 67A - Publishing images containing sexual acts If a person publishes or transmits images containing a sexual explicit act or conduct. Penalty- Imprisonment up to seven years, or/and with fine up to RS 1,000,000 Section 67B – Publishing child porn or predating children online If a person captures, publishes or transmits images of a child in a sexually explicit act or conduct. If a person induces a child into a sexual act. A child is defined as anyone under 18. Penalty- Imprisonment up to five years, or/and with fine up to RS 1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to RS 1,000,000 on second conviction. Section 67C - Failure to maintain records Persons deemed as intermediary (such as an ISP) must maintain required records for stipulated time. Failure is an offence. Penalty- Imprisonment up to three years, or/and with fine.
  • 22. Section 69 - Failure/refusal to decrypt data If the Controller is satisfied that it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence, for reasons to be recorded in writing, by order, direct any agency of the Government to intercept any information transmitted through any computer resource. The subscriber or any person in charge of the computer resource shall, when called upon by any agency which has been directed, must extend all facilities and technical assistance to decrypt the information. The subscriber or any person who fails to assist the agency referred is deemed to have committed a crime. Penalty- Imprisonment up to seven years and possible fine.
  • 23. Section 66A In September 2012, a freelance cartoonist Aseem Trivedi was arrested under the Section 66A of the IT Act, Section 2 of Prevention of Insults to National Honor Act, 1971 and for sedition under the Section 124 of the Indian Penal Code. His cartoons depicting widespread corruption in India were considered offensive. On 12 April 2012, a Chemistry professor from Jadavpur University, Ambikesh Mahapatra, was arrested for sharing a cartoon of West Bengal Chief Minister Mamata Banerjee and then Railway Minister Mukul Roy. The email was sent from the email address of a housing society. Subrata Sengupta, the secretary of the housing society, was also arrested. They were charged under Section 66A and B of the IT Act, for defamation under Sections 500, for obscene gesture to a woman under Section 509, and abetting a crime under Section 114 of the Indian Penal Code. On 30 October 2012, a Pondicherry businessman Ravi Srinivasan was arrested under Section 66A. He had sent tweet accusing Karti Chidambaram, son of then Finance Minister P. Chidambaram, of corruption. Karti Chidambaram had complained to the police. On 19 November 2012, a 21-year-old girl was arrested from Palghar for posting a message on Face book criticizing the shutdown in Mumbai for the funeral of Bal Thackeray. Another 20-year- old girl was arrested for "liking" the post. They were initially charged under Section 295A of the Indian Penal Code (hurting religious sentiments) and Section 66A of the IT Act. Later, Section 295A was replaced by Section 505(2) (promoting enmity between classes). A group of Shiv Sena workers vandalised a hospital run by the uncle of one of girls.
  • 24. CATEGORIES OF CYBER CRIME • DDoS Attacks. These are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources. ... • Botnets. ... • Identity Theft. ... • Cyberstalking. ... • Social Engineering. ... • PUPs. ... • Phishing. ... • Prohibited/Illegal Content.
  • 25. PREVENTION • Download applications from trusted sources. Keep your applications and operating system (e.g. Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to prevent potential attacks on older software. Make regular back-ups of all your important data, and store it in another location.
  • 26. Cyber security • Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. • It aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks and technologies.
  • 27. CONCLUSION • Though not all people are victims to cyber crimes, they are still at risk. Crimes by computer vary, and they don�t always occur behind the computer, but they executed by computer. The hacker�s identity is ranged between 12 years young to 67years old. The hacker could live three continents away from its victim, and they wouldn�t even know they were being hacked. Crimes done behind the computer are the 21st century�s problem. With the technology increasing, criminals don�t have to rob banks, nor do they have to be outside in order to commit any crime. They have everything they need on their lap.
  • 28. THIS PPT IS DONE WITH HELP OF :- KARTAVYA SOM,MANISH SINGH,AYUSH CHAUHAN, VANSH BALIYAN,VANSH MALIK (NEW),VIPIN RANGA OF CLASS:- X-B ✔
  • 29. FOLLOW ME :- 👍👍