SlideShare una empresa de Scribd logo
1 de 15
CYBER CRIME
DEFINE
 According to Wikipedia.com cyber crime also known as
computer crime that refers to any crime that involves
a computer and a network.
 Cyber crime is defined as crimes committed on the internet
using the computer as either a tool or a targeted victim.
CATEGORIES OF CYBER CRIME
COMPUTER
AS
A
TARGET
COMPUTER
AS
A
WEAPON
TYPES OF CYBER CRIME
CYBER TERRORISM
PHISHING
Phishing is just one of the
many frauds on the Internet,
trying to fool people into parting
with their money.
EMAIL-SPOOFING
 Email spoofing is the
creation of email messages
with a forged sender
address
 Spoofing is when a
spammer sends out emails
using your email address in
the From: field.
COMPUTER VANDALISM
Damaging or destroying data rather than stealing or misusing them is called
cyber vandalism.
SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs.
India stands 11th in the ranking for Cyber Crime in the
World, constituting 3% of the Global Cyber Crime.
WhY IndIA?
 A rapidly growing online user base
 121 Million Internet Users
 65 Million Active Internet Users, up by 28% from 51 million in 2010
 50 Million users shop online on Ecommerce and Online Shopping Sites
 46+ Million Social Network Users
 346 million mobile users had subscribed to Data Packages.
 Source: IAMAI; Juxt; wearesocial 2011
 Cyber Security involves protection of sensitive personal and business
information through prevention, detection and response to different online
attacks.
The Information
Technology Act, 2000
(1) Cyber crime can involve criminal
activities that are traditional in nature,
such as theft, fraud, deformation and
mischief, all of which are subjected to
the India Penal code
Cyber Laws in india
• Continued Website Hacks and Defacements
• Data and Information theft
• Increasing phishing attacks on Ecommerce
and Financial Websites
• Cybercriminals targeting Social and
Professional Networks
• Threats directed at the Mobile Platform:
Smartphones and Tablets
The FuTure oF Cyber-Crimes in
india
saFeTy TiPs For Cyber Crime
• USE ANTIVIRUS SOFTWARE
• INSERT FIREWALLS
• UNINSTALL UNNCESSARY SOFTWARES
• MAINTAIN BACKUP
• CHECK SECURITY SETTING

Más contenido relacionado

La actualidad más candente

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 

La actualidad más candente (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
cyber security
cyber securitycyber security
cyber security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 

Destacado

הצעת החוק ריבית עונשית
הצעת החוק ריבית עונשיתהצעת החוק ריבית עונשית
הצעת החוק ריבית עונשיתפוליסה
 
هل تفكر في إنشاء تطبيقاً للجوال والربح منه
هل تفكر في إنشاء تطبيقاً للجوال والربح منههل تفكر في إنشاء تطبيقاً للجوال والربح منه
هل تفكر في إنشاء تطبيقاً للجوال والربح منهHassan Mohammed
 
Projects in wikipedia for nomade fr
Projects in wikipedia for nomade frProjects in wikipedia for nomade fr
Projects in wikipedia for nomade frBACHOUNDA Mohammed
 
تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...
تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...
تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...Hassan Mohammed
 
مشاريع ويكيميديا
مشاريع ويكيميديا مشاريع ويكيميديا
مشاريع ويكيميديا BACHOUNDA Mohammed
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destacado (10)

הצעת החוק ריבית עונשית
הצעת החוק ריבית עונשיתהצעת החוק ריבית עונשית
הצעת החוק ריבית עונשית
 
List grp arl
List grp arlList grp arl
List grp arl
 
هل تفكر في إنشاء تطبيقاً للجوال والربح منه
هل تفكر في إنشاء تطبيقاً للجوال والربح منههل تفكر في إنشاء تطبيقاً للجوال والربح منه
هل تفكر في إنشاء تطبيقاً للجوال والربح منه
 
Projects in wikipedia for nomade fr
Projects in wikipedia for nomade frProjects in wikipedia for nomade fr
Projects in wikipedia for nomade fr
 
تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...
تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...
تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
مشاريع ويكيميديا
مشاريع ويكيميديا مشاريع ويكيميديا
مشاريع ويكيميديا
 
Www.kutub.info 16076
Www.kutub.info 16076Www.kutub.info 16076
Www.kutub.info 16076
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar a CYBER CRIME

Similar a CYBER CRIME (20)

Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Internet
InternetInternet
Internet
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 

Más de Kunal Sinha

Spermaceti organ :In Sperm whale
Spermaceti organ :In Sperm whaleSpermaceti organ :In Sperm whale
Spermaceti organ :In Sperm whaleKunal Sinha
 
Why tidal energy !
Why tidal energy !Why tidal energy !
Why tidal energy !Kunal Sinha
 
Estuaries-Where River meets the sea.
Estuaries-Where River meets the sea.Estuaries-Where River meets the sea.
Estuaries-Where River meets the sea.Kunal Sinha
 
Different Expeditions and their contribution in ocean science
Different Expeditions and their contribution in ocean scienceDifferent Expeditions and their contribution in ocean science
Different Expeditions and their contribution in ocean scienceKunal Sinha
 
Conjugation and transduction
Conjugation and transduction Conjugation and transduction
Conjugation and transduction Kunal Sinha
 
Classification of seaweed
Classification of seaweedClassification of seaweed
Classification of seaweedKunal Sinha
 
Thyroid gland ( glandula thyreoidea)
Thyroid gland ( glandula thyreoidea)Thyroid gland ( glandula thyreoidea)
Thyroid gland ( glandula thyreoidea)Kunal Sinha
 

Más de Kunal Sinha (8)

Spermaceti organ :In Sperm whale
Spermaceti organ :In Sperm whaleSpermaceti organ :In Sperm whale
Spermaceti organ :In Sperm whale
 
Why tidal energy !
Why tidal energy !Why tidal energy !
Why tidal energy !
 
Estuaries-Where River meets the sea.
Estuaries-Where River meets the sea.Estuaries-Where River meets the sea.
Estuaries-Where River meets the sea.
 
Different Expeditions and their contribution in ocean science
Different Expeditions and their contribution in ocean scienceDifferent Expeditions and their contribution in ocean science
Different Expeditions and their contribution in ocean science
 
Conjugation and transduction
Conjugation and transduction Conjugation and transduction
Conjugation and transduction
 
Classification of seaweed
Classification of seaweedClassification of seaweed
Classification of seaweed
 
Pearl Formation
Pearl FormationPearl Formation
Pearl Formation
 
Thyroid gland ( glandula thyreoidea)
Thyroid gland ( glandula thyreoidea)Thyroid gland ( glandula thyreoidea)
Thyroid gland ( glandula thyreoidea)
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

CYBER CRIME

  • 2. DEFINE  According to Wikipedia.com cyber crime also known as computer crime that refers to any crime that involves a computer and a network.  Cyber crime is defined as crimes committed on the internet using the computer as either a tool or a targeted victim.
  • 3. CATEGORIES OF CYBER CRIME COMPUTER AS A TARGET COMPUTER AS A WEAPON
  • 6. PHISHING Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money.
  • 7. EMAIL-SPOOFING  Email spoofing is the creation of email messages with a forged sender address  Spoofing is when a spammer sends out emails using your email address in the From: field.
  • 8. COMPUTER VANDALISM Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.
  • 9. SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs.
  • 10. India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime.
  • 11. WhY IndIA?  A rapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages.  Source: IAMAI; Juxt; wearesocial 2011
  • 12.  Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks.
  • 13. The Information Technology Act, 2000 (1) Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code Cyber Laws in india
  • 14. • Continued Website Hacks and Defacements • Data and Information theft • Increasing phishing attacks on Ecommerce and Financial Websites • Cybercriminals targeting Social and Professional Networks • Threats directed at the Mobile Platform: Smartphones and Tablets The FuTure oF Cyber-Crimes in india
  • 15. saFeTy TiPs For Cyber Crime • USE ANTIVIRUS SOFTWARE • INSERT FIREWALLS • UNINSTALL UNNCESSARY SOFTWARES • MAINTAIN BACKUP • CHECK SECURITY SETTING