SlideShare ist ein Scribd-Unternehmen logo
1 von 23
CYBER
SECURITY
In Society....
Presented By: Rubal Sagwal
NIT, Kurukshetra
CYBERSPACE :
“cyberspace” does not have a single agreed definition, some things can
be said,
• First, cyberspace is not a physical place, although many elements of
cyberspace are indeed physical,
• Second, cyberspace includes but is not limited to the Internet—
cyberspace also includes computers (some of which are attached to
the Internet and some not) and networks (some of which may be part
of the Internet and some not).
• Third, cyberspace includes many intangibles, such as information and
software and how different elements of cyberspace are connected to
each other.
So a rough definition might be that :
• cyberspace consists of objects based on or dependent on computing
and communication technology;
• The information that these objects use, store, handle, or process; and
• The interconnections among these various elements.
CYBER CRIME
Crimes are not to be measured
by the issue of events, but by
the bad intensions of men.
WHAT IS CYBER CRIME
• Cybercrime is any unlawful activity that involves a computer and
network.
Categorize of Cybercrime
• The Computer as a Target : using a computer to attack other
computers.
• The computer as a weapon : using a computer to commit real world
crimes.
is nothing
but where the
computer used as an
object or subject of
crime…
TYPES OF CYBER CRIME
• Hacking
• Child Pornography
• Phishing
• Denial of service Attack
• Virus Spreading
• Software Piracy
• Cyber Terrorism
• Cyber Vandalism
Why India?
A rapidly growing online user base
121 Million Internet Users
65 Million Active Internet Users, up by
28% from 51 million in 2015
50 Million users shop online on
Ecommerce and Online Shopping Sites
46+ Million Social Network Users
346 million mobile users had
subscribed to Data Packages.
Source: IAMAI; Juxt; wearesocial
Monday, 27 August 2018
TARGET DISTRIBUTION
COST OF CYBER CRIME IN INDIA
• 29.9 million people fell victim to cybercrime,
• $4 billion in direct financial losses,
• $3.6 billion in time spent resolving the crime,
• 4 in 5 online adults (80%) have been a victim of Cybercrime,
• 17% of adults online have experienced cybercrime on their
mobile phone.
Source: Norton Cybercrime Report
“The modern thief can steal more with a
computer than with a gun.
Tomorrow’s terrorist may be able to do
more damage with a keyboard than
with a bomb.”
WHY CARE ABOUT
CYBERSECURITY?
• We live in an increasingly networked world, from personal banking to
government infrastructure. Protecting those networks is no longer optional.
• Most people in modern society encounter computing and communications
technologies all day, every day .
• Cyber risk is now firmly at the top of the international agenda .
• Cyber crime costs the global economy over US$400 billion per year,
(according to estimates by the Center for Strategic and International Studies).
In 2013, some 3,000 companies in the United States had their systems
compromised by criminals, the Center reports.
• The development of an Internet of Things, which enables communication
between machines, raises the possibility of appliances being manipulated by
hackers.
• People’s personal lives involve computing through social networking, home
management, communication with family and friends, and management of
personal affairs.
• Computing will be embedded in countless places and objects; even today,
computing devices are easily transported in pockets or on wrists.
• Your cyber hygiene affects others : Infected devices have a way of infecting
other devices and compromised systems can make everyone vulnerable.
• Nearly everyone (in everyday society, business, government, and the military
services) relies on wireless and wired digital communications systems.
• Given our dependence on cyberspace, we want and need our information
technologies to do what they are supposed to do and only when they are
supposed to do it.
SAFETY TIPS TO CYBERCRIME
• Use antivirus software’s
• insert firewalls
• uninstall unnecessary software
• maintain backup
• check security settings
• Stay anonymous - choose a genderless screen name
• Never give your full name or address to strangers
Contd…
• Learn ‘Etiquette' - follow it and expect it from others
• Don't respond to harassing or negative messages (flames)
• Get out of uncomfortable or hostile situations quickly
• Update software’s timely
• Cryptography
• Learn more about Internet privacy
Top 10 Security Assessment Tools
ADVANTAGES OF CYBER SECURITY
• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and outgoing data on our
computer.
• Security will defend from hacks
and virus.
CASE STUDIE…
Did you know that e-mails, long considered the most convenient form of
communication, can actually spring some nasty surprises for you?
One financial Institute registered a crime stating that some persons
(“perpetrators”) have done certain acts through misleading emails seemingly
coming from ICICI Bank’s email ID.
Such acts have been done with an intent to defraud the Customers.
The Investigation was carried out with help of those emails received by the
customers of that financial Institute and arrested the suspect, the place of
offence at Vijaywada was searched for the evidence . There one Lap Top and
Mobile Phone was seized which was used for the commission of the crime.
The arrested accused had used open source code email application software
for sending spam emails. After spamming emails to financial Institute customers
he got the response from around 120 customers of which 80 are genuine and
others are not correct because it do not have debit card details as required for
e-banking.
The financial Institute customers those who have received his email felt that the email
was originated from the financial Institute bank. When they filled the confidential
information and submitted that time said information was directed to accused. This was
possible because the dynamic link was given in the first page (Home page) of the fake
web site.
The dynamic link was coded by handling the Internet Explorer onclick() event and the
information of the form will be submitted to the web server (Where the fake web site is
hosted). Then server will send the data to configured email address and in this case
email configured was to the accused email.
All the information after Phishing (user name, password, Transaction password, Debit
card Number and PIN, mothers maiden name) which he had received through Wi-Fi
internet connectivity of Reliance.com which was available on his Acer Lap Top.
This crime has been registered u/s U/Sec. 66 of IT Act, sec 419, 420, 465, 468, 471
of I.P.C Sections 51, 63 and 65 of Copyright Act, 1957 which attract the punishment of
3 years imprisonment and fine up to 2 lacs rupees which accused never thought of .
THANK YOU…

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 

Ähnlich wie Cyber Security in Society

Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Ähnlich wie Cyber Security in Society (20)

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 

Mehr von Rubal Sagwal

Mehr von Rubal Sagwal (20)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Cyber Security in Society

  • 1. CYBER SECURITY In Society.... Presented By: Rubal Sagwal NIT, Kurukshetra
  • 2. CYBERSPACE : “cyberspace” does not have a single agreed definition, some things can be said, • First, cyberspace is not a physical place, although many elements of cyberspace are indeed physical, • Second, cyberspace includes but is not limited to the Internet— cyberspace also includes computers (some of which are attached to the Internet and some not) and networks (some of which may be part of the Internet and some not). • Third, cyberspace includes many intangibles, such as information and software and how different elements of cyberspace are connected to each other.
  • 3. So a rough definition might be that : • cyberspace consists of objects based on or dependent on computing and communication technology; • The information that these objects use, store, handle, or process; and • The interconnections among these various elements.
  • 5. Crimes are not to be measured by the issue of events, but by the bad intensions of men.
  • 6. WHAT IS CYBER CRIME • Cybercrime is any unlawful activity that involves a computer and network. Categorize of Cybercrime • The Computer as a Target : using a computer to attack other computers. • The computer as a weapon : using a computer to commit real world crimes.
  • 7. is nothing but where the computer used as an object or subject of crime…
  • 8. TYPES OF CYBER CRIME • Hacking • Child Pornography • Phishing • Denial of service Attack • Virus Spreading • Software Piracy • Cyber Terrorism • Cyber Vandalism
  • 9.
  • 10. Why India? A rapidly growing online user base 121 Million Internet Users 65 Million Active Internet Users, up by 28% from 51 million in 2015 50 Million users shop online on Ecommerce and Online Shopping Sites 46+ Million Social Network Users 346 million mobile users had subscribed to Data Packages. Source: IAMAI; Juxt; wearesocial Monday, 27 August 2018
  • 12. COST OF CYBER CRIME IN INDIA • 29.9 million people fell victim to cybercrime, • $4 billion in direct financial losses, • $3.6 billion in time spent resolving the crime, • 4 in 5 online adults (80%) have been a victim of Cybercrime, • 17% of adults online have experienced cybercrime on their mobile phone. Source: Norton Cybercrime Report
  • 13. “The modern thief can steal more with a computer than with a gun. Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb.”
  • 14. WHY CARE ABOUT CYBERSECURITY? • We live in an increasingly networked world, from personal banking to government infrastructure. Protecting those networks is no longer optional. • Most people in modern society encounter computing and communications technologies all day, every day . • Cyber risk is now firmly at the top of the international agenda . • Cyber crime costs the global economy over US$400 billion per year, (according to estimates by the Center for Strategic and International Studies). In 2013, some 3,000 companies in the United States had their systems compromised by criminals, the Center reports. • The development of an Internet of Things, which enables communication between machines, raises the possibility of appliances being manipulated by hackers.
  • 15. • People’s personal lives involve computing through social networking, home management, communication with family and friends, and management of personal affairs. • Computing will be embedded in countless places and objects; even today, computing devices are easily transported in pockets or on wrists. • Your cyber hygiene affects others : Infected devices have a way of infecting other devices and compromised systems can make everyone vulnerable. • Nearly everyone (in everyday society, business, government, and the military services) relies on wireless and wired digital communications systems. • Given our dependence on cyberspace, we want and need our information technologies to do what they are supposed to do and only when they are supposed to do it.
  • 16.
  • 17. SAFETY TIPS TO CYBERCRIME • Use antivirus software’s • insert firewalls • uninstall unnecessary software • maintain backup • check security settings • Stay anonymous - choose a genderless screen name • Never give your full name or address to strangers
  • 18. Contd… • Learn ‘Etiquette' - follow it and expect it from others • Don't respond to harassing or negative messages (flames) • Get out of uncomfortable or hostile situations quickly • Update software’s timely • Cryptography • Learn more about Internet privacy
  • 19. Top 10 Security Assessment Tools
  • 20. ADVANTAGES OF CYBER SECURITY • Defend us from critical attacks. • Browse the safe website. • Internet security process all the incoming and outgoing data on our computer. • Security will defend from hacks and virus.
  • 21. CASE STUDIE… Did you know that e-mails, long considered the most convenient form of communication, can actually spring some nasty surprises for you? One financial Institute registered a crime stating that some persons (“perpetrators”) have done certain acts through misleading emails seemingly coming from ICICI Bank’s email ID. Such acts have been done with an intent to defraud the Customers. The Investigation was carried out with help of those emails received by the customers of that financial Institute and arrested the suspect, the place of offence at Vijaywada was searched for the evidence . There one Lap Top and Mobile Phone was seized which was used for the commission of the crime. The arrested accused had used open source code email application software for sending spam emails. After spamming emails to financial Institute customers he got the response from around 120 customers of which 80 are genuine and others are not correct because it do not have debit card details as required for e-banking.
  • 22. The financial Institute customers those who have received his email felt that the email was originated from the financial Institute bank. When they filled the confidential information and submitted that time said information was directed to accused. This was possible because the dynamic link was given in the first page (Home page) of the fake web site. The dynamic link was coded by handling the Internet Explorer onclick() event and the information of the form will be submitted to the web server (Where the fake web site is hosted). Then server will send the data to configured email address and in this case email configured was to the accused email. All the information after Phishing (user name, password, Transaction password, Debit card Number and PIN, mothers maiden name) which he had received through Wi-Fi internet connectivity of Reliance.com which was available on his Acer Lap Top. This crime has been registered u/s U/Sec. 66 of IT Act, sec 419, 420, 465, 468, 471 of I.P.C Sections 51, 63 and 65 of Copyright Act, 1957 which attract the punishment of 3 years imprisonment and fine up to 2 lacs rupees which accused never thought of .