+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
Cyber crimes
1.
2. Introduction
How do you catch a criminal that doesn’t have a
face? A criminal that can steal $100,000 in under a
minute without even stepping foot inside the
building? That’s what law enforcement agencies
are currently trying to deal with as “cyber crimes
facing faceless thugs” – crimes committed using a
computer or the Internet – become more popular.
3.
4.
5. Categories of Cyber Crime
Individual
• cyber stalking
• distributing
pornography
• trafficking
Property
• bank details
• siphon off
money
Government
• cyber terrorism
6. Types of Cyber Crimes
Types of
cyber
crime
Hacking
Cyber
Stalking
Malicious
Software
Identity
Theft
Theft
7. Types of Criminals
Children and youngsters between
the age group of 6 – 18 years
Structured hackers
Expert hackers / crackers
Dissatisfied employees
8. Cyber Crimes- Indian Cases
With increasing mobile and internet penetration in the
country, cyber crimes have also increased
proportionately. Between 2011 and 2015, more than 32000
cyber crimes were reported across the country.
The introduction of technologies, devices including smart
phones and complex applications, and rise in usage of
cyber space for businesses has resulted in such an increase.
9.
10.
11. What is the Government Doing?
The Ministry of Home Affairs has issued an Advisory to
the State Governments and Union Territory
Administrations on Cyber Crime.
Government has set up cyber forensic training and
investigation labs.
advanced training to Law Enforcement Agencies.
The Indian Computer Emergency Response Team (CERT)
issues alerts and advisories regarding latest cyber threats
and countermeasures on regular basis.
The cyber space is being closely monitored by the
Government .
12. The Vulnerabilities and Causes
USB
thumb
drives
Wireless
access
points
The
Trojan
human
Optical
media
Smart
phones
and other
digital
devices
E-mail
13.
14. Ways to protect yourself from cyber crime
Use anti-
virus
software
If in doubt,
block
More than
one e-mail
accounts
Ignore pop-
ups
Macs are as
vulnerable
as PCs
Two-step
verification
Only shop
online on
secure sites