SlideShare una empresa de Scribd logo
1 de 24
Wednesday, 25 March 2015
Presentation by : Aman Sharma
Cyber Crime is a term used to broadly describe criminal
activity in which computers or computer networks are a
tool, a target, or a place of criminal activity and include
everything from electronic cracking to denial of service
attacks. It also include traditional crimes in which
computers or networks are used to enable the illicit
activity.
We can categorize cyber crime in two ways:
 The computer as a target :- using a computer to
attacks other computer, e.g. Hacking, virus/worms
attacks etc.
 The computer as a weapon :- using a computer to
commit real world crime e.g. cyber terrorism, credit
card fraud and pornography etc.
TYPES OF
CYBER CRIME
Hacking
 Hacking is not defined in the amended IT Act, 2000.
Hacking means unauthorized attempts to bypass the
security mechanisms of an information system or
network.
 In simple words Hacking is the unauthorized access to a
computer system, programs, data and network resources.
 Government websites are the hot target of the hackers.
Data Theft(According to IT Act, 2008, crime of data theft u/s 43 (b))
 If any person without permission of the owner or any other
person, who is in charge of a computer, computer system of
computer network - downloads, copies or extracts any data,
computer data base or information from such computer,
computer system or computer network including information
or data held or stored in any removable storage medium, then
it is data theft.
Trojan attacks
 Malicious software that attaches itself to
other software and act like something useful
for the system but do the things that are
quiet damping. For eg. VIRUS , WORMS,
TROJAN HORSE
 In most of the cases, viruses can do any
amount of damage, the creator intends them
to do. They can send your data to a third
party and even delete your data from your
computer.
CHILD PORNOGRAPHY
 The Internet is being highly used by its
abusers to reach and abuse children sexually,
worldwide.
 Pornography is describing or showing sexual
acts in order to cause sexual excitement
through books, films, pornography websites
etc.
Computer Vandalism
 Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism. These are
program that attach themselves to a file and then
circulate.
E-mail spamming
 Sending email to thousand and thousand of user- similar
to a chain letter.
Cyber Stalking
 Cyber Stalking is use of the Internet or other electronic
means to stalk someone. Stalking generally involves
harassing or threatening behaviour that an individual
engages repeatedly.
E-mail bombing
 Characterised by abusers repeatedly sending an
identical email message to a particular address.
Sale of illegal article
 This would include trade of narcotics, weapons etc.,
by posting websites, auction websites, bulletin boards
by using email communication.
Online gambling
 Also known as i-gambling or internet gambling.
 Generally gambling offered through internet is
termed as online gambling.
Cyber terrorism
 The intentional use of computer, networks and, public
internet to cause destruction and harm for personal
objectives. Objectives may be political , religious or
ideological.
Software Piracy
 Theft of software through the illegal copying of
genuine programs or the counterfeiting and distribution
of products intended to pass for the original.
 Phishing is just one of the many frauds on the Internet, trying
to fool people into parting with their money. Phishing refers to
the receipt of unsolicited emails by customers of Financial
Institutions, requesting them to enter their Username,
Password or other personal information to access their
Account for some reason.
 The fraudster then has access to the customer's online bank
account and to the funds contained in that account.
Cyber Crimes threatens National Security and
rising level of cyber crime is an indication of
enormous threat to national security. Fan clubs
of Underworld Dons like Dawood Ibrahim and
Chhota Shakeel and other wanted underworld
dons are also doing the rounds on orkut. There
is huge potential for damage to national security
through cyber attacks. The internet is a means
for money bounding and funding terrorist
attacks in an organized manner.
 Under Section (2) (b) of IT Act, 2008,”cyber
security means protecting information,
equipment, devices computer, computer
resource, communication device and
information stored therein from unauthorized
access, use, disclosure, disruption,
modification or destruction.”
 In India, The IT Act, 2000 as amended by The
IT (Amendment) Act, 2008 is known as the
Cyber law
Antivirus And Anti Spyware Software:
 Antivirus software consists of computer programs that
attempt to identify, thwart and eliminate computer viruses
and other malicious software. Anti spy wares are used to
restrict backdoor program, Trojans and other spy wares to
be installed on the computer.
Firewalls:
 A firewall protects a computer network from
unauthorized access. Network firewalls may be hardware
devices, software programs, or a combination of the two.
A network firewall typically guards an internal computer
network against malicious access from outside the
network.
Cyber Security : Cyber Security involves protection of
sensitive personal and business information through
prevention, detection and response to different online
attacks. Cyber security actually preventing the attacks,
cyber security.
Privacy Policy : Before submitting your name , e-mail ,
address, on a website look for the site’s privacy policy.
Cryptography: Cryptography is the science of encrypting and
decrypting information. Encryption is like sending a postal
mail to another party with a lock code on the envelope which
is known only to the sender and the recipient.
Cyber Ethics and Laws: Cyber ethics and cyber laws are also
being formulated to stop cyber crimes. It is a responsibility of
every individual to follow cyber ethics and cyber laws so that
the increasing cyber crimes shall reduce. Security Software
like Anti Viruses and Anti Spy Wares should be installed on all
computers, in order to remain secure from Cyber Crimes.
Cyber crime can involve criminal activities that are
traditional in nature, such as theft, fraud, deformation
and mischief, all of which were subjected to the India
Penal code. In simple way we can say that cyber crime
is unlawful acts where in the computer is either a tool
or both.
The abuse of computer has also given birth of new age
crime that are addressed by the Information Technology
Act, 2000.
“If any person, dishonestly, or fraudulently,
Destroys, Deletes or Alters any Information residing in a computer
resource or diminishes its value or utility or affects it injuriously by
any means;
Steals, conceals, destroys or alters or causes any person to steal,
conceal, destroy or alter any computer source code used for a
computer resource with an intention to cause damage;
he shall be punishable with imprisonment for a term which may
extend to two to three years or with fine which may extend to five lakh
rupees or with both.”
 Cybercrime is indeed getting the recognition it deserves.
However, it is not going to restricted that easily . In fact ,
it is highly likely that cyber crime and its hackers will
continue developing and upgrading to stay ahead of the
law. So, to make us safer we must need cyber security.
 Indian Laws are well drafted and are capable of handling
all kinds of challenges as posed by cyber criminals.
However, the enforcement agencies are required to be
well versed with the changing technologies and Laws.”
THANK YOU!!!

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 

Similar a Cyber Crime Types and Prevention Methods

Similar a Cyber Crime Types and Prevention Methods (20)

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Computer crime
Computer crimeComputer crime
Computer crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 

Último

Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Último (20)

Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

Cyber Crime Types and Prevention Methods

  • 1. Wednesday, 25 March 2015 Presentation by : Aman Sharma
  • 2. Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It also include traditional crimes in which computers or networks are used to enable the illicit activity.
  • 3. We can categorize cyber crime in two ways:  The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks etc.  The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 5. Hacking  Hacking is not defined in the amended IT Act, 2000. Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network.  In simple words Hacking is the unauthorized access to a computer system, programs, data and network resources.  Government websites are the hot target of the hackers.
  • 6. Data Theft(According to IT Act, 2008, crime of data theft u/s 43 (b))  If any person without permission of the owner or any other person, who is in charge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium, then it is data theft.
  • 7. Trojan attacks  Malicious software that attaches itself to other software and act like something useful for the system but do the things that are quiet damping. For eg. VIRUS , WORMS, TROJAN HORSE  In most of the cases, viruses can do any amount of damage, the creator intends them to do. They can send your data to a third party and even delete your data from your computer.
  • 8. CHILD PORNOGRAPHY  The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide.  Pornography is describing or showing sexual acts in order to cause sexual excitement through books, films, pornography websites etc.
  • 9. Computer Vandalism  Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate. E-mail spamming  Sending email to thousand and thousand of user- similar to a chain letter.
  • 10. Cyber Stalking  Cyber Stalking is use of the Internet or other electronic means to stalk someone. Stalking generally involves harassing or threatening behaviour that an individual engages repeatedly. E-mail bombing  Characterised by abusers repeatedly sending an identical email message to a particular address.
  • 11. Sale of illegal article  This would include trade of narcotics, weapons etc., by posting websites, auction websites, bulletin boards by using email communication. Online gambling  Also known as i-gambling or internet gambling.  Generally gambling offered through internet is termed as online gambling.
  • 12. Cyber terrorism  The intentional use of computer, networks and, public internet to cause destruction and harm for personal objectives. Objectives may be political , religious or ideological. Software Piracy  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 13.  Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.  The fraudster then has access to the customer's online bank account and to the funds contained in that account.
  • 14. Cyber Crimes threatens National Security and rising level of cyber crime is an indication of enormous threat to national security. Fan clubs of Underworld Dons like Dawood Ibrahim and Chhota Shakeel and other wanted underworld dons are also doing the rounds on orkut. There is huge potential for damage to national security through cyber attacks. The internet is a means for money bounding and funding terrorist attacks in an organized manner.
  • 15.
  • 16.
  • 17.  Under Section (2) (b) of IT Act, 2008,”cyber security means protecting information, equipment, devices computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction.”  In India, The IT Act, 2000 as amended by The IT (Amendment) Act, 2008 is known as the Cyber law
  • 18. Antivirus And Anti Spyware Software:  Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, Trojans and other spy wares to be installed on the computer. Firewalls:  A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network.
  • 19. Cyber Security : Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Cyber security actually preventing the attacks, cyber security. Privacy Policy : Before submitting your name , e-mail , address, on a website look for the site’s privacy policy.
  • 20. Cryptography: Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. Cyber Ethics and Laws: Cyber ethics and cyber laws are also being formulated to stop cyber crimes. It is a responsibility of every individual to follow cyber ethics and cyber laws so that the increasing cyber crimes shall reduce. Security Software like Anti Viruses and Anti Spy Wares should be installed on all computers, in order to remain secure from Cyber Crimes.
  • 21. Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which were subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.
  • 22. “If any person, dishonestly, or fraudulently, Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; he shall be punishable with imprisonment for a term which may extend to two to three years or with fine which may extend to five lakh rupees or with both.”
  • 23.  Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us safer we must need cyber security.  Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.”